Results 311 to 320 of about 4,446,471 (346)
Some of the next articles are maybe not open access.

Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives

ACM Journal on Emerging Technologies in Computing Systems, 2021
In the context of hardware trust and assurance, reverse engineering has been often considered as an illegal action. Generally speaking, reverse engineering aims to retrieve information from a product, i.e., integrated circuits (ICs) and printed circuit ...
Ulbert J. Botero   +9 more
semanticscholar   +1 more source

Reverse-engineering bar charts using neural networks

Journal of Vision, 2020
Reverse-engineering bar charts extract textual and numeric information from the visual representations of bar charts to support application scenarios that require the underlying information.
Fangfang Zhou   +7 more
semanticscholar   +1 more source

Investigating the effect of reverse engineering pedagogy in K‐12 robotics education

Computer Applications in Engineering Education, 2020
The purpose of the study is to explore the effectiveness of reverse engineering pedagogy (REP) and forward project‐based pedagogy (FPP) in K‐12 robotics education.
Baichang Zhong, Si-jie Kang, Zehui Zhan
semanticscholar   +1 more source

Reverse Engineering Convolutional Neural Networks Through Side-channel Information Leaks

Design Automation Conference, 2018
A convolutional neural network (CNN) model represents a crucial piece of intellectual property in many applications. Revealing its structure or weights would leak confidential information.
Weizhe Hua, Zhiru Zhang, G. Suh
semanticscholar   +1 more source

REVERSE ENGINEERING:

Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
This keynote presentation reviews the algorithms able to analyse a digital image and able to retrieve part of its processing history.This problem is relevant because more and more images happen to have lost their native EXIF metadata. In this presentation is described several tools gathering information about an image's compression, resampling ...
openaire   +2 more sources

HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion

IEEE Transactions on Dependable and Secure Computing, 2019
Hardware manipulations pose a serious threat to numerous systems, ranging from a myriad of smart-X devices to military systems. In many attack scenarios an adversary merely has access to the low-level, potentially obfuscated gate-level netlist.
Marc Fyrbiak   +8 more
semanticscholar   +1 more source

Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis

IEEE Communications Surveys and Tutorials, 2019
Knowledge about a network protocol to understand the communication between entities is necessary for vulnerability research, penetration testing, malware analysis, network reconnaissance, and network modeling.
Stephan Kleber, Lisa Maile, F. Kargl
semanticscholar   +1 more source

Mitigating Reverse Engineering Attacks on Deep Neural Networks

IEEE Computer Society Annual Symposium on VLSI, 2019
With the structure of deep neural networks (DNN) being of increasing commercial value, DNN reverse engineering attacks have become a great security concern.
Yuntao Liu   +2 more
semanticscholar   +1 more source

Hands-On Ghidra - A Tutorial about the Software Reverse Engineering Framework

SPRO@CCS, 2019
In this tutorial, the Ghidra software reverse engineering framework will be presented, its characteristics highlighted and its features to the hitherto industry standard in reverse engineering tools, IDA Pro - the interactive disassembler, compared ...
Roman Rohleder
semanticscholar   +1 more source

Integrated Flow for Reverse Engineering of Nanoscale Technologies

Asia and South Pacific Design Automation Conference, 2019
In view of potential risks of piracy and malicious manipulation of complex integrated circuits built in technologies of 45 nm and less, there is an increasing need for an effective and efficient process of reverse engineering.
Bernhard Lippmann   +9 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy