搜索结果: 1-15 共查到“Reverse-engineering”相关记录26条 . 查询时间(0.111 秒)
Imagine standing in a lumberyard and being asked to build a house -- without blueprints or instructions of any kind. The materials are all in front of you, but that doesn't mean you have the first ide...
Anomalies and Vector Space Search: Tools for S-Box Reverse-Engineering
Reverse-engineering Vector space search BCT
2019/5/21
S-boxes are functions with an input so small that the simplest way to specify them is their lookup table (LUT). Unfortunately, some algorithm designers exploit this fact to avoid providing the algorit...
3D RECONSTRUCTION-REVERSE ENGINEERING – DIGITAL FABRICATION OF THE EGYPTIAN PALERMO STONE USING BY SMARTPHONE AND LIGHT STRUCTURED SCANNER
Cultural Heritage Structured Light Scanning Smartphone 3D modeling 3D sculpting Digital Fabrication
2018/6/4
This paper presents a pipeline that has been developed to acquire a shape with particular features both under the geometric and radiometric aspects. In fact, the challenge was to build a 3D model of t...
On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering
side-channel analysis differential plaintext attack SCADPA
2018/3/5
Lightweight block ciphers rely on simple operations to allow compact implementation. Thanks to its efficiency, bit permutation has emerged as an optimal choice for state-wise diffusion. It can be impl...
HAL- The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion
Hardware Reverse Engineering Hardware Trojans Hardware Trojan Detection
2017/8/21
Hardware manipulations pose a serious threat to numerous systems, ranging from myriads of smart-X devices to military systems. In many attack scenarios an adversary merely has access to the low-level,...
Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware
MD5 hash function cryptanalysis
2016/3/18
In May 2012, a highly advanced malware for espionage dubbed Flame was found targeting the Middle-East. As it turned out, it used a forged signature to infect Windows machines by MITM-ing Windows Updat...
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1
Reverse-Engineering S-Box Streebog Kuznyechik
2016/1/27
The Russian Federation’s standardization agency has recently
published a hash function called Streebog and a 128-bit block cipher
called Kuznyechik. Both of these algorithms use the same 8-bit S-Box...
Diffusion Programmable Device : The device to prevent reverse engineering
Reverse engineering Countermeasure Diffusion programmable device (DPD)
2016/1/25
The secret information, which is embedded in integrated circuit (IC) devices such as
a smart card, has the risk of theft by reverse engineering (RE). The circuit design of IC
can be stolen by the RE...
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors
Cache slices Intel last level cache,
2015/12/29
Dividing last level caches into slices is a popular method to prevent memory accesses from
becoming a bottleneck on modern multicore processors. In order to assess and understand the benefits
of cac...
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
S-box design criteria Skipjack linearity
2015/12/22
S-Boxes are the key components of many cryptographic primitives and designing them to improve resilience to attacks such as linear or differential cryptanalysis is well understood. In this paper, we i...
Terrestrial Laser Scanning Applied for Reverse Engineering and Monitoring of Historical Buildings
Terrestrial Laser scanning for engineering survey site surveying data processing deformation analysis
2015/12/8
A main advantage of terrestrial laser scanning is the possibility to nearly simultaneously acquire the geometrical positions of millions of object points in 3D. However this is also the main bottle ne...
Cultural heritage;Metrology;Surveying;3D Modelling;Reverse Engineering
Cultural Heritage Metrology Surveying 3D Modelling Reverse Engineering
2015/11/13
This research illustrates the experimentations accomplished in the field of Cultural Heritage aimed to the determination of the “total form” of the objects with a high resolution, using a simple and t...
High Density Digital Form for Cultural Heritage: Synthetic Modelling and Reverse Engineering of the Four Horses of the Basilica of San Marco In Venice
Cultural heritage Metrology Surveying 3D Modelling Reverse Engineering
2015/11/13
This research would like to illustrate an experimental work carried out in the filed of Cultural Heritage, finalized to determine a complete object shape at very high resolution. The aim was to go bey...
There is a need to reverse engineer architectural hardware, with hinges and brackets being typical, for use in the restoration of buildings in which the original hardware is damaged. Another use for r...
CONSTRAINTS IN CAD MODELS FOR REVERSE ENGINEERING USING PHOTOGRAMMETRY
CAD Modeling Photogrammetry Reconstruction
2015/1/6
The paper discusses the use of geometric constraints in a CAD model-based photogrammetric system. The CAD models are represented by CSG (Constructive Solid Geometry) models. The geometric primitives t...