Reverse engineering methods produce different descriptions of software architectures. In this work we analyze and define the task of exploring and comparing these descriptions. ...
This paper introduces some new types of optical fault attacks called fault masking attacks. These attacks are aimed at disrupting of the normal memory operation through preventing ...
One of the challenges for software architects is ensuring that an implemented system faithfully represents its architecture. We describe and demonstrate a tool, called DiscoTect, ...
—Current research on code clones tries to address the question whether or not code clones are harmful for the quality of software. As most of these studies are based on the fine...
Nicolas Bettenburg, Weiyi Shang, Walid Ibrahim, Br...
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...