Sciweavers

70 search results - page 10 / 14
» Reverse engineering under siege
Sort
View
WCRE
2003
IEEE
14 years 3 months ago
Identification of Software Instabilities
As software evolves, maintenance practices require a process of accommodating changing requirements while minimizing the cost of implementing those changes. Over time, incompatibi...
Jennifer Bevan, E. James Whitehead Jr.
ICSM
1999
IEEE
14 years 2 months ago
Browsing and Searching Software Architectures
Software architecture visualization tools tend to support browsing, that is, exploration by following concepts. If architectural diagrams are to be used during daily software main...
Susan Elliott Sim, Charles L. A. Clarke, Richard C...
SP
2009
IEEE
130views Security Privacy» more  SP 2009»
14 years 4 months ago
Wirelessly Pickpocketing a Mifare Classic Card
The Mifare Classic is the most widely used contactless smartcard on the market. The stream cipher CRYPTO1 used by the Classic has recently been reverse engineered and serious atta...
Flavio D. Garcia, Peter van Rossum, Roel Verdult, ...
SP
2006
IEEE
193views Security Privacy» more  SP 2006»
14 years 3 months ago
Analysis of the Linux Random Number Generator
Linux is the most popular open source project. The Linux random number generator is part of the kernel of all Linux distributions and is based on generating randomness from entrop...
Zvi Gutterman, Benny Pinkas, Tzachy Reinman
INFOVIS
2003
IEEE
14 years 3 months ago
Multiscale Visualization of Small World Networks
Many networks under study in Information Visualization are “small world” networks. These networks first appeared in the study social networks and were shown to be relevant mod...
David Auber, Yves Chiricota, Fabien Jourdan, Guy M...