Results 311 to 320 of about 4,446,471 (346)
Some of the next articles are maybe not open access.
ACM Journal on Emerging Technologies in Computing Systems, 2021
In the context of hardware trust and assurance, reverse engineering has been often considered as an illegal action. Generally speaking, reverse engineering aims to retrieve information from a product, i.e., integrated circuits (ICs) and printed circuit ...
Ulbert J. Botero +9 more
semanticscholar +1 more source
In the context of hardware trust and assurance, reverse engineering has been often considered as an illegal action. Generally speaking, reverse engineering aims to retrieve information from a product, i.e., integrated circuits (ICs) and printed circuit ...
Ulbert J. Botero +9 more
semanticscholar +1 more source
Reverse-engineering bar charts using neural networks
Journal of Vision, 2020Reverse-engineering bar charts extract textual and numeric information from the visual representations of bar charts to support application scenarios that require the underlying information.
Fangfang Zhou +7 more
semanticscholar +1 more source
Investigating the effect of reverse engineering pedagogy in K‐12 robotics education
Computer Applications in Engineering Education, 2020The purpose of the study is to explore the effectiveness of reverse engineering pedagogy (REP) and forward project‐based pedagogy (FPP) in K‐12 robotics education.
Baichang Zhong, Si-jie Kang, Zehui Zhan
semanticscholar +1 more source
Reverse Engineering Convolutional Neural Networks Through Side-channel Information Leaks
Design Automation Conference, 2018A convolutional neural network (CNN) model represents a crucial piece of intellectual property in many applications. Revealing its structure or weights would leak confidential information.
Weizhe Hua, Zhiru Zhang, G. Suh
semanticscholar +1 more source
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
This keynote presentation reviews the algorithms able to analyse a digital image and able to retrieve part of its processing history.This problem is relevant because more and more images happen to have lost their native EXIF metadata. In this presentation is described several tools gathering information about an image's compression, resampling ...
openaire +2 more sources
This keynote presentation reviews the algorithms able to analyse a digital image and able to retrieve part of its processing history.This problem is relevant because more and more images happen to have lost their native EXIF metadata. In this presentation is described several tools gathering information about an image's compression, resampling ...
openaire +2 more sources
HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion
IEEE Transactions on Dependable and Secure Computing, 2019Hardware manipulations pose a serious threat to numerous systems, ranging from a myriad of smart-X devices to military systems. In many attack scenarios an adversary merely has access to the low-level, potentially obfuscated gate-level netlist.
Marc Fyrbiak +8 more
semanticscholar +1 more source
IEEE Communications Surveys and Tutorials, 2019
Knowledge about a network protocol to understand the communication between entities is necessary for vulnerability research, penetration testing, malware analysis, network reconnaissance, and network modeling.
Stephan Kleber, Lisa Maile, F. Kargl
semanticscholar +1 more source
Knowledge about a network protocol to understand the communication between entities is necessary for vulnerability research, penetration testing, malware analysis, network reconnaissance, and network modeling.
Stephan Kleber, Lisa Maile, F. Kargl
semanticscholar +1 more source
Mitigating Reverse Engineering Attacks on Deep Neural Networks
IEEE Computer Society Annual Symposium on VLSI, 2019With the structure of deep neural networks (DNN) being of increasing commercial value, DNN reverse engineering attacks have become a great security concern.
Yuntao Liu +2 more
semanticscholar +1 more source
Hands-On Ghidra - A Tutorial about the Software Reverse Engineering Framework
SPRO@CCS, 2019In this tutorial, the Ghidra software reverse engineering framework will be presented, its characteristics highlighted and its features to the hitherto industry standard in reverse engineering tools, IDA Pro - the interactive disassembler, compared ...
Roman Rohleder
semanticscholar +1 more source
Integrated Flow for Reverse Engineering of Nanoscale Technologies
Asia and South Pacific Design Automation Conference, 2019In view of potential risks of piracy and malicious manipulation of complex integrated circuits built in technologies of 45 nm and less, there is an increasing need for an effective and efficient process of reverse engineering.
Bernhard Lippmann +9 more
semanticscholar +1 more source

