Sciweavers

684 search results - page 45 / 137
» Reverse Engineering CAPTCHAs
Sort
View
ACSW
2003
14 years 11 months ago
Provably Secure Key Exchange: An Engineering Approach
We promote an engineering approach to design of provably secure key exchange protocols. Using the model of Canetti and Krawczyk we present a systematic method to arrive at efficie...
Yiu Shing Terry Tin, Colin Boyd, Juanma Gonz&aacut...
WCRE
2009
IEEE
15 years 4 months ago
NTrace: Function Boundary Tracing for Windows on IA-32
—For a long time, dynamic tracing has been an enabling technique for reverse engineering tools. Tracing can not only be used to record the control flow of a particular component...
Johannes Passing, Alexander Schmidt, Martin von L&...
ISESE
2005
IEEE
15 years 3 months ago
A comparative study on the re-documentation of existing software: code annotations vs. drawing editors
During software evolution, programmers spend a lot of time and effort in the comprehension of the internal code structure. Such an activity is often required because the available...
Marco Torchiano, Filippo Ricca, Paolo Tonella
WCRE
2003
IEEE
15 years 3 months ago
Comparative Evaluation of Dynamic Visualisation Tools
Despite their potential applications in software comprehension, it appears that dynamic visualisation tools are seldom used outside the research laboratory. This paper presents an...
Michael J. Pacione, Marc Roper, Murray Wood
ISPASS
2007
IEEE
15 years 4 months ago
Reverse State Reconstruction for Sampled Microarchitectural Simulation
For simulation, a tradeoff exists between speed and accuracy. The more instructions simulated from the workload, the more accurate the results — but at a higher cost. To reduce ...
Paul D. Bryan, Michel C. Rosier, Thomas M. Conte