Academic literature on the topic 'Barrier to reverse engineer'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Barrier to reverse engineer.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Barrier to reverse engineer"

1

Wildum, Steffen, Daniela Paulsen, Kai Thede, Helga Ruebsamen-Schaeff, and Holger Zimmermann. "In VitroandIn VivoActivities of AIC292, a Novel HIV-1 Nonnucleoside Reverse Transcriptase Inhibitor." Antimicrobial Agents and Chemotherapy 57, no. 11 (August 19, 2013): 5320–29. http://dx.doi.org/10.1128/aac.01377-13.

Full text
Abstract:
ABSTRACTNonnucleoside reverse transcriptase inhibitors (NNRTIs) are important and frequently used elements of highly active antiretroviral therapy (HAART) for the treatment of human immunodeficiency virus type 1 (HIV-1) infection. However, the development of drug resistance, as well as the side effects of existing drugs, defines a medical need for novel NNRTIs with excellent tolerability, improved activity against NNRTI-resistant viruses, and a low barrier to resistance. Within the chemical class of diarylpyrazole-[imidazolidinone]-carboxamides, AIC292 was identified as a promising novel HIV-1 NNRTI and has successfully completed single-dose clinical phase I studies. Here, we report on the antiviral activity of AIC292, evaluatedin vitroagainst wild-type and NNRTI-resistant HIV-1 isolates andin vivousing an engineered mouse xenograft model. AIC292 inhibited wild-type HIV-1 laboratory strains at low nanomolar concentrations, was well tolerated in different cell lines, and showed excellent selectivity in a lead profiling screen. In addition, activity of AIC292 could be demonstrated against a broad panel of wild-type HIV-1 group M and group O clinical isolates. AIC292 also retained activity against viruses harboring NNRTI resistance-associated mutations (RAMs), including the most prevalent variants, K103N, Y181C, and G190A. Interestingly, viruses bearing the L100I RAM were hypersusceptible to AIC292. Two-drug combination assays showed no antagonistic interactions between AIC292 and representative marketed HIV drugs with regard to antiviral activity. Furthermore, AIC292 displayed potent antiviralin vivoefficacy in a mouse xenograft model when applied once daily. Taken together, these data show that AIC292 represents a molecule with the antiviral properties of a novel NNRTI for the treatment of HIV-1 infection.
APA, Harvard, Vancouver, ISO, and other styles
2

Roberts, C. J., David John Edwards, M. Reza Hosseini, Monica Mateo-Garcia, and De-Graft Owusu-Manu. "Post-occupancy evaluation: a review of literature." Engineering, Construction and Architectural Management 26, no. 9 (October 21, 2019): 2084–106. http://dx.doi.org/10.1108/ecam-09-2018-0390.

Full text
Abstract:
Purpose The purpose of this paper is to analyse extant literature on POE of a building’s operations and performance as a means of holistically mapping the existing body of knowledge (BOK); identify impediments preventing its wide-scale adoption throughout practice; and develop new theory that seeks to integrate digital technologies (such as building information modelling (BIM)) within facilities management (FM) via a POE feedback mechanism. Design/methodology/approach An inductive and interpretivist methodological approach is adopted that utilises a mixed methods systematic review to map bibliometric data on the POE, associated underpinning processes and benchmarking facilities. Publication and citation metrics are produced via the software VOSviewer to determine the extent to which POE interrelates with other fields of study (namely, digital technologies and FM). Findings The BOK accrued illustrates that whilst POE has received comparatively scant academic attention in comparison to other fields of study, interest in the area is growing. The work also identifies that a stronger community of practice (CoP) is needed (that comprises of academics and practitioners) to ensure that a consistent approach to POE implementation is developed and that the barriers to POE implementation are addressed. Originality/value Findings presented accentuate the need for design practitioners to reverse engineer POE implementation to inform future design vis-à-vis simply reporting upon an existing building’s performance post construction. Other new theories are also introduced as a means of engendering wider academic discourse in this field of science.
APA, Harvard, Vancouver, ISO, and other styles
3

Sampath, Rahul, Nathan W. Cummins, and Andrew D. Badley. "Casp8p41: The Protean Mediator of Death in CD4 T-cells that Replicate HIV." Journal of Cell Death 9 (January 2016): JCD.S39872. http://dx.doi.org/10.4137/jcd.s39872.

Full text
Abstract:
HIV cure is now the focus of intense research after Timothy Ray Brown (the Berlin patient) set the precedent of being the first and only person cured. A major barrier to achieving this goal on a meaningful scale is an elimination of the latent reservoir, which is thought to comprise CD4-positive cells that harbor integrated, replication-competent HIV provirus. These cells do not express viral proteins, are indistinguishable from uninfected CD4 cells, and are thought to be responsible for HIV viral rebound–-that occurs within weeks of combination anti retroviral therapy (cART) interruption. Modalities to engineer transcriptional stimulation (reactivation) of this dormant integrated HIV provirus, leading to expression of cytotoxic viral proteins, are thought to be a specific way to eradicate the latently infected CD4 pool and are becoming increasingly relevant in the era of HIV cure. HIV protease is one such protein produced after HIV reactivation that cleaves procaspase-8 to generate a novel protein Casp8p41. Casp8p41 then binds to the BH3 domain of BAK, leading to BAK oligomerization, mitochondrial depolarization, and apoptosis. In central memory T cells (TCMs) from HIV-infected patients, an elevated Bcl-2/procaspase-8 ratio was observed, and Casp8p41 binding to Bcl-2 was associated with a lack of reactivation-induced cell death. This was reversed by priming cells with a specific Bcl-2 antagonist prior to reactivation, resulting in increased cell death and decreased HIV DNA in a Casp8p41-dependent pathway. This review describes the biology, clinical relevance, and implications of Casp8p41 for a potential cure.
APA, Harvard, Vancouver, ISO, and other styles
4

Chang, Allison, Cynthia Rudin, Michael Cavaretta, Robert Thomas, and Gloria Chou. "How to reverse-engineer quality rankings." Machine Learning 88, no. 3 (June 3, 2012): 369–98. http://dx.doi.org/10.1007/s10994-012-5295-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kinsbourne, Marcel. "How to Reverse Engineer Visual Cognition." Contemporary Psychology 48, no. 4 (August 2003): 451–54. http://dx.doi.org/10.1037/000852.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kalantari, John, Heidi Nelson, and Nicholas Chia. "The Unreasonable Effectiveness of Inverse Reinforcement Learning in Advancing Cancer Research." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 01 (April 3, 2020): 437–45. http://dx.doi.org/10.1609/aaai.v34i01.5380.

Full text
Abstract:
The “No Free Lunch” theorem states that for any algorithm, elevated performance over one class of problems is offset by its performance over another. Stated differently, no algorithm works for everything. Instead, designing effective algorithms often means exploiting prior knowledge of data relationships specific to a given problem. This “unreasonable efficacy” is especially desirable for complex and seemingly intractable problems in the natural sciences. One such area that is rife with the need for better algorithms is cancer biology—a field where relatively few insights are being generated from relatively large amounts of data. In part, this is due to the inability of mere statistics to reflect cancer as a genetic evolutionary process—one that involves cells actively mutating in order to navigate host barriers, outcompete neighboring cells, and expand spatially.Our work is built upon the central proposition that the Markov Decision Process (MDP) can better represent the process by which cancer arises and progresses. More specifically, by encoding a cancer cell's complex behavior as a MDP, we seek to model the series of genetic changes, or evolutionary trajectory, that leads to cancer as an optimal decision process. We posit that using an Inverse Reinforcement Learning (IRL) approach will enable us to reverse engineer an optimal policy and reward function based on a set of “expert demonstrations” extracted from the DNA of patient tumors. The inferred reward function and optimal policy can subsequently be used to extrapolate the evolutionary trajectory of any tumor. Here, we introduce a Bayesian nonparametric IRL model (PUR-IRL) where the number of reward functions is a priori unbounded in order to account for uncertainty in cancer data, i.e., the existence of latent trajectories and non-uniform sampling. We show that PUR-IRL is “unreasonably effective” in gaining interpretable and intuitive insights about cancer progression from high-dimensional genome data.
APA, Harvard, Vancouver, ISO, and other styles
7

Zanni, Mariangela, Tim Sharpe, Philipp Lammers, Leo Arnold, and James Pickard. "Developing a Methodology for Integration of Whole Life Costs into BIM Processes to Assist Design Decision Making." Buildings 9, no. 5 (May 5, 2019): 114. http://dx.doi.org/10.3390/buildings9050114.

Full text
Abstract:
A common barrier to achieving design intent is the absence of comprehensive information about operational performance during design development. This results in uninformed decision-making which impacts on actual building performance, in particular Whole Life Costs (WLC). It is proposed that Building Information Modelling (BIM) has the potential to facilitate a more comprehensive and accurate design approach from the initial stages if the model can utilize reliable and robust cost and performance data from buildings in use. This paper describes the initial findings of a research project that has investigated the integration of WLC estimation into BIM processes. The study focusses specifically on the rapidly emerging Private Rental Sector (PRS) as the build-to-rent market has repeatable tasks and similar workflow patterns, roles and responsibilities, but impacts of WLC can significantly influence the business model. The study adopted a mixed method approach for the development and validation of a structured standardized process for timely WLC estimation through BIM. The research identified a number of barriers. These included varying definitions of WLC calculation methodologies; the availability and standards of data sources, in particular, the misalignment of coding systems for identification and classification of components at various levels of development, proprietary ownership of data, lack of knowledge and skills in team members to produce and/or utilize data sources, and limitations of software. However, the research proposes that these may be addressed by a reverse-engineered systematic process that uses the Integrated DEFinition (IDEF) 3 structured diagramming modelling technique that can be incorporated into a software model and has developed a model for a systematic approach for BIM-enabled WLC assessment based on CE principles which would include access to live data streams from completed buildings. The paper describes this model development which has the potential to enhance BIM lifecycle management through an augmented decision-making approach that is integral to the natural design development process.
APA, Harvard, Vancouver, ISO, and other styles
8

DEMAGALHAES, J., and O. TOUSSAINT. "How bioinformatics can help reverse engineer human aging." Ageing Research Reviews 3, no. 2 (April 2004): 125–41. http://dx.doi.org/10.1016/j.arr.2003.08.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Michael, Iacovos P., Sadegh Saghafinia, and Douglas Hanahan. "A set of microRNAs coordinately controls tumorigenesis, invasion, and metastasis." Proceedings of the National Academy of Sciences 116, no. 48 (November 8, 2019): 24184–95. http://dx.doi.org/10.1073/pnas.1913307116.

Full text
Abstract:
MicroRNA-mediated gene regulation has been implicated in various diseases, including cancer. This study examined the role of microRNAs (miRNAs) during tumorigenesis and malignant progression of pancreatic neuroendocrine tumors (PanNETs) in a genetically engineered mouse model. Previously, a set of miRNAs was observed to be specifically up-regulated in a highly invasive and metastatic subtype of mouse and human PanNET. Using functional assays, we now implicate different miRNAs in distinct phenotypes: miR-137 stimulates tumor growth and local invasion, whereas the miR-23b cluster enables metastasis. An algorithm, Bio-miRTa, has been developed to facilitate the identification of biologically relevant miRNA target genes and applied to these miRNAs. We show that a top-ranked miR-137 candidate gene, Sorl1, has a tumor suppressor function in primary PanNETs. Among the top targets for the miR-23b cluster, Acvr1c/ALK7 has recently been described to be a metastasis suppressor, and we establish herein that it is down-regulated by the miR-23b cluster, which is crucial for its prometastatic activity. Two other miR-23b targets, Robo2 and P2ry1, also have demonstrable antimetastatic effects. Finally, we have used the Bio-miRTa algorithm in reverse to identify candidate miRNAs that might regulate activin B, the principal ligand for ALK7, identifying thereby a third family of miRNAs—miRNA-130/301—that is congruently up-regulated concomitant with down-regulation of activin B during tumorigenesis, suggestive of functional involvement in evasion of the proapoptotic barrier. Thus, dynamic up-regulation of miRNAs during multistep tumorigenesis and malignant progression serves to down-regulate distinctive suppressor mechanisms of tumor growth, invasion, and metastasis.
APA, Harvard, Vancouver, ISO, and other styles
10

Duchscherer, Samantha, Robert Stewart, and Marie Urban. "revengc: An R package to Reverse Engineer Summarized Data." R Journal 10, no. 2 (2019): 114. http://dx.doi.org/10.32614/rj-2018-044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Barrier to reverse engineer"

1

Knight, Darren C. "Return on Investment Analysis for Implementing Barriers to Reverse Engineering and Imitation." BYU ScholarsArchive, 2011. https://scholarsarchive.byu.edu/etd/2633.

Full text
Abstract:
Reverse engineering (extracting information about a product from the product itself) is a competitive strategy for many firms and is often costly to innovators. Recent research has proven metrics for estimating the reverse engineering time and barrier and has shown that products can strategically be made more difficult to reverse engineer, thus protecting the innovator. Reverse engineering, however, is only the first phase of attempting to duplicate a product. Imitating – the process of discovering how to physically reproduce the performance of the reverse engineered product in one or more of its performance areas – is the second and final phase. This thesis presents metrics for the time and barrier to imitating and shows how they can be joined with reverse engineering metrics to estimate a total time and total barrier to duplicate a product. As there is a cost associated with the design of barriers to reverse engineering and in imitating it is important that a return on investment analysis be performed to ensure a profitable endeavor. Details of such an analysis are presented here. To illustrate the methodology, two case studies are presented. The first is an analysis of KithcenAid's Stand Mixer. The second is an analysis of a cantilevered "L-beam" that has been structurally optimized under four conditions to achieve a specified mechanical performance. Additionally, anecdotal solutions to creating barriers to reverse engineering and imitating are discussed throughout.
APA, Harvard, Vancouver, ISO, and other styles
2

Germann, Christian. "Pricing Multi Barrier Reverse Convertibles." St. Gallen, 2008. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/97193445002/$FILE/97193445002.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Erni, David. "Rendite und Risiko von Barrier Reverse Convertibles." St. Gallen, 2007. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/04602694001/$FILE/04602694001.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lindauer, Thomas. "An Empirical Analysis of (Multi-) Barrier Reverse Convertibles." St. Gallen, 2008. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/02600518002/$FILE/02600518002.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Smedberg, Gustav, and Jenny Malmgren. "Is it possible to reverse engineer obfuscated bytecode back to source code?" Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-278065.

Full text
Abstract:
AbstractThere are a lot of old software in the world that has not been supported or kept up todate and would need to be updated to seal security vulnerabilities, as well as to updatefunctions in the program. In those cases where the source code has been lost ordeliberately deleted, would it be possible to use reverse engineering to retrieve thesource code?This study aims to show what java bytecode is and how it is used, as well as how oneis able to go from java bytecode back to source code in a process called Reverse Engineering.Furthermore, the study will show previous work in reverse engineering,in obfuscation and to explain further details about what Java Virtual machine,bytecode and obfuscation is and how they work. Three programs of various complexityare made into bytecode and then obfuscated. The difference between the originalcode and the obfuscated code are then analyzed.The results show that it is possible to reverse engineer obfuscated code but someparts. Obfuscation does protect the code, as all the variable names are changed andevery unused method are removed, as well as some methods changed to non-conventionalways to program.KeywordsReverse engineering, Java, JVM, bytecode, obfuscation, safety.
Sammanfattning Det finns mycket gammal mjukvara ute i världen som inte längre underhålls och skulle behöva uppdateras för att kunna täppa säkerhetshål alternativtuppdatera funktioner i dessa program. I fall där källkoden har förlorats ellerraderats , skulle det då vara möjligt att använda dekompilering för att återfåkällkoden? Rapport syftar till att redovisa vad java bytekod är och hur den används samthur man kan gå från java bytekod tillbaka till källkod genom en process somkallas dekompilering samt hur man kan skydda sig mot detta genom obfuskeringav kod. Vidare redovisas tidigare forskning inom dekompilering samtobfuskering och kompletterar med förklaringar vad en Java Virtual Machine,Bytekod och obfuskering är och hur de fungerar. Tre program av varierande komplexitet görs om till bytekod, obfuskeras för att sedan dekompileras ochjämföra resultatet gentemot källkoden. Slutligen, det är möjligt att dekompilera den obfuskerade koden men enbartvissa delar av källkoden går att återskapa. Alla variabelnamn och oanvändametoder försvinner helt samt att koden ibland ändras till icke-konventionellasätt att programmera. Nyckelord Reverse engineering, Java, JVM, bytecode, obfuskering, dekompilering, säkerhet
APA, Harvard, Vancouver, ISO, and other styles
6

Graetzel, Chauncey. "MEMS & high speed vision : development and application to reverse-engineer Drosophila flight control /." Zürich : ETH, 2008. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=18096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kunanandam, Visakasuntharam. "Reverse flow of brain interstitial fluid through venular blood-brain barrier." Thesis, University of Hull, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.363207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bowman, David C. "Image Stitching and Matching Tool in the Automated Iterative Reverse Engineer (AIRE) Integrated Circuit Analysis Suite." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1533766175549951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kandikonda, Balausha Varshini. "A Key Based Obfuscation and Anonymization of Behavior VHDL Models." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7686.

Full text
Abstract:
Intellectual Property (IP) based Integrated Circuit (IC) design is an established approach for the design of a complex System-on-Chip (SoC). Porting the preparatory designs to third-party without enough security margin exposes an attacker to perform reverse engineering (RE) on the designs and hence counterfeiting, IP theft etc., are common now-a-days. Design obfuscation can reduce RE attempt by an attacker. In this work, we propose a key based obfuscation and anonymization method for a behavioral IP. Given a behavioral VHDL description, the assignment and conditional statements are modified by incorporating random boolean operations with unique random key bits. The obfuscated VHDL is then anonymized by random identifiers. The resultant behavioral model can be simulated correctly upon application of original key sequence. Simulation results with nine datapath intensive benchmarks with three different lengths of test sequences show that the simulation overhead is negligible (only a few seconds). We evaluate the probability of reverse engineering the obfuscated design and show that it is extremely low.
APA, Harvard, Vancouver, ISO, and other styles
10

Luk-Cyr, Jacques. "Experiments and modeling of multilayered coatings and membranes : application to thermal barrier coatings and reverse osmosis membranes." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/93822.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2014.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 153-157).
In this thesis, I developed a novel methodology for characterizing interfacial delamination of thermal barrier coatings. The proposed methodology involves novel experiments-plus numerical simulations in order to determine the material parameters describing such failure when the interface is modeled using traction-separation constitutive laws. Furthermore, a coupled fluid-permeation and large deformation theory is proposed for crosslinked polymers with a view towards application to reverse-osmosis. A systematic simulation plus experiment-based methodology is proposed in order to calibrate the material parameters of the theory. Finally, the process of reverse osmosis is studied in the context of water desalination. An experimental set-up is proposed in order to characterize the thin-film composite membranes widely used in the industry, and a preliminary set of experiments are performed.
by Jacques Luk-Cyr.
Part 1. Thermal barrier coatings -- part 2. Reverse osmosis membranes -- part 3. Thin-film-composite membranes: application to reverse osmosis in water desalination.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Barrier to reverse engineer"

1

Clement, Dennett Daniel, and Adams Reginald B, eds. Inside jokes: Using humor to reverse-engineer the mind. Cambridge, Mass: MIT Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Addison, Wesley Software. Reverse Engineer Rootkit. Pearson Education, Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Inside Jokes: Using Humor to Reverse-Engineer the Mind. MIT Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dennett, Daniel C., Matthew M. Hurley, and Reginald B. Adams Jr. Inside Jokes: Using Humor to Reverse-Engineer the Mind. MIT Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wong, Reginald. Mastering Reverse Engineering: Re-engineer your ethical hacking skills. Packt Publishing, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dennett, Daniel C., Matthew M. Hurley, and Adams Reginald B. Jr. Inside Jokes: Using Humor to Reverse-Engineer the Mind. MIT Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Decoding Greatness: How the Best in the World Reverse Engineer Success. Simon & Schuster, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Friedman, Ron. Decoding Greatness: How the Best in the World Reverse Engineer Success. Simon & Schuster Audio and Blackstone Publishing, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Friedman, Ron. Decoding Greatness: How the Best in the World Reverse Engineer Success. Simon & Schuster, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

James, Paul. Reverse Engineer Your Future: Stop Waiting for Success - Go Out and Make It Happen Now. Lioncrest Publishing, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Barrier to reverse engineer"

1

Amarilli, Antoine, David Naccache, Pablo Rauzy, and Emil Simion. "Can a Program Reverse-Engineer Itself?" In Cryptography and Coding, 1–9. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25516-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Urendes Jiménez, Eloy, Antonio Flores Caballero, Francisco Molina Rueda, Javier Iglesias Giménez, and Roberto Oboe. "Reverse-Engineer the Brain: Perspectives and Challenges." In Biosystems & Biorobotics, 173–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38556-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bandyopadhyay, Anirban. "Philosophical Transformation Essential to Reverse Engineer Consciousness." In Nanobrain, 1–24. Boca Raton : CRC Press, [2020]: CRC Press, 2020. http://dx.doi.org/10.1201/9780429107771-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Roe, Michael. "How to reverse engineer an EES device." In Fast Software Encryption, 305–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Le Bouder, Hélène, Sylvain Guilley, Bruno Robisson, and Assia Tria. "Fault Injection to Reverse Engineer DES-Like Cryptosystems." In Foundations and Practice of Security, 105–21. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05302-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dugerdil, Philippe, and Roland Sako. "Dynamic Analysis Techniques to Reverse Engineer Mobile Applications." In Communications in Computer and Information Science, 250–68. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30142-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Zewei, Min Shu, Junzheng Shi, Zigang Cao, Fei Xu, Zhen Li, Gang Xiong, and S. M. Yiu. "How to Reverse Engineer ICS Protocols Using Pair-HMM." In Information and Communication Technology for Intelligent Systems, 115–25. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1747-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wagner, James, and Alexander Rasin. "A Framework to Reverse Engineer Database Memory by Abstracting Memory Areas." In Lecture Notes in Computer Science, 304–19. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59003-1_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hunt, Alexander J., Nicholas S. Szczecinski, Emanuel Andrada, Martin Fischer, and Roger D. Quinn. "Using Animal Data and Neural Dynamics to Reverse Engineer a Neuromechanical Rat Model." In Biomimetic and Biohybrid Systems, 211–22. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-22979-9_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pluta, Ryszard, A. Misicka, M. Barcikowska, S. Spisacka, A. W. Lipkowski, and S. Januszewski. "Possible Reverse Transport of β-Amyloid Peptide Across the Blood-Brain Barrier." In Brain Edema XI, 73–77. Vienna: Springer Vienna, 2000. http://dx.doi.org/10.1007/978-3-7091-6346-7_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Barrier to reverse engineer"

1

Knight, Darren C., and Christopher A. Mattson. "Return on Investment Analysis for Implementing Barriers to Reverse Engineering." In ASME 2011 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2011. http://dx.doi.org/10.1115/detc2011-47094.

Full text
Abstract:
Reverse engineering (extracting information about a product from the product itself) is a competitive strategy for many firms and is often costly to innovators. Recent research has proven metrics for estimating the reverse engineering time and barrier and has shown that products can strategically be made more difficult to reverse engineer, thus protecting the innovator. Reverse engineering, however, is only the first phase of attempting to duplicate a product. Imitating — the process of discovering how to physically reproduce the performance of the reverse engineered product in one or more of its performance areas — is the second and final phase. This paper presents metrics for the time and barrier to imitating and shows how they can be joined with reverse engineering metrics to estimate a total time and total barrier to duplicate a product. As there is a cost associated with the design of barriers to reverse engineering and imitating it is important that a return on investment analysis be performed to ensure a profitable endeavor. Details of such an analysis are presented here.
APA, Harvard, Vancouver, ISO, and other styles
2

Harston, Stephen P., and Christopher A. Mattson. "Metrics for Evaluating and Optimizing the Barrier and Time to Reverse Engineer a Product." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-86781.

Full text
Abstract:
Reverse engineering, defined as extracting information about a product from the product itself, is a common industry practice for gaining insight into innovative products. Both the original designer and those reverse engineering the original design can benefit from estimating the time and barrier to reverse engineer a product. This paper presents a set of metrics and parameters that can be used to calculate the barrier to reverse engineer any product as well as the time required to do so. To the original designer, these numerical representations of the barrier and time can be used to strategically identify and improve product characteristics so as to increase the difficulty and time to reverse engineer them. As the metrics and parameters developed in this paper are quantitative in nature, they can also be used in conjunction with numerical optimization techniques, thereby enabling products to be developed with a maximum reverse engineering barrier and time — at a minimum development cost. On the other hand, these quantitative measures enable competitors who reverse engineer original designs to focus their efforts on products that will result in the greatest return on investment.
APA, Harvard, Vancouver, ISO, and other styles
3

Curtis, Shane K., Stephen P. Harston, and Christopher A. Mattson. "A Generic Formulaic Characterization of the Time to Reverse Engineer the Tolerances of a Product." In ASME 2009 International Mechanical Engineering Congress and Exposition. ASMEDC, 2009. http://dx.doi.org/10.1115/imece2009-13123.

Full text
Abstract:
Reverse engineering is the process of extracting information about a product from the product itself. An estimate of the barrier and time to extract information from any product is useful for the original designer and those reverse engineering, as both are affected by reverse engineering activities. The authors have previously presented a set of metrics and parameters to estimate the barrier and time for product reverse engineering. This work has laid the foundation for the developments of the current paper, which address the issue of tolerance extraction during reverse engineering. Under the developments presented herein, measurement and statistical analysis of the variation between multiple samples of a product are required to reverse engineer its tolerances. When reconstruction is the reason reverse engineering activities are carried out, this level of reverse engineering can be critical, as tolerances ensure that products function properly and consistently. In this paper, we introduce metrics that (i) characterize how the flow of information from a product during reverse engineering changes as additional product samples are evaluated, and (ii) estimate the total barrier and time to reverse engineer the tolerances of a product. Additionally, a simple example is introduced to illustrate how to use the newly developed metrics and to serve as empirical validation.
APA, Harvard, Vancouver, ISO, and other styles
4

Curtis, Shane K., Christopher A. Mattson, and Stephen P. Harston. "On Barriers to Reverse Engineering Mechanical Components." In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28610.

Full text
Abstract:
Reverse engineering is a common design strategy in industry. It is a term that has come to encompass a large array of engineering and design activities in the literature; however, in its basic form, reverse engineering is simply the process of extracting information about a product from the product itself. Depending on its use, it may or may not be advantageous to utilize a reverse engineering strategy. As with any rational decision, reverse engineering is only favorable when the benefits from its use outweigh the investment. Therefore, a general understanding of the principles that increase the difficulty or investment required to reverse engineer mechanical products would be helpful for everyone affected by reverse engineering activities. In this paper, we articulate and explore these fundamental principles by reviewing several examples from the literature and from our own experience. We then use the principles as a basis for the development of a methodology to build barriers to reverse engineering into new products, and provide a simple example to illustrate its use.
APA, Harvard, Vancouver, ISO, and other styles
5

Nelson, Daniel A. "Development of a Non-Contacting Mechanical Seal for High Performance Turbocharger Applications." In ASME Turbo Expo 2018: Turbomachinery Technical Conference and Exposition. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/gt2018-77126.

Full text
Abstract:
This paper presents the design and development of a non-contacting dry-gas mechanical seal for high performance automotive turbocharger applications. Turbochargers are increasingly being incorporated into high performance automobile engines to improve fuel efficiency, enhance energy recovery, and increase horsepower as compared with similar sized naturally aspirated engines. Minimizing the wear rate of tribological surfaces in the turbomachinery is critical to maximizing the reliability and durability of the turbocharger. A dry-gas seal for turbochargers and related technologies with 2 to 4 cm shafts has been developed. The seal provides a complete barrier between the bearing oil and compressor flow path and is capable of reverse pressure and high speed. The seal performance was evaluated for speeds between 60,000 to 80,000 RPM, pressure differentials between −0.8 (reverse pressure) to 6 bar, and temperatures between 20 to 200 °C. Structural and thermal response of the seal components to the operating conditions are analyzed using finite element methods and the tribological behavior of the seal rings are analyzed using computational fluid dynamics. The design is experimentally validated in a seal test stand. This novel approach reduces turbocharger blowby and shows no measurable wear when compared with piston ring seals.
APA, Harvard, Vancouver, ISO, and other styles
6

Ragupathy, R., R. K. Mishra, and R. D. Misal. "Life Estimation of TBC on an Aero Gas Turbine Combustor: A Finite Element Approach." In ASME 2011 Turbo Expo: Turbine Technical Conference and Exposition. ASMEDC, 2011. http://dx.doi.org/10.1115/gt2011-45027.

Full text
Abstract:
Thermal barrier coatings (TBCs) are used for the thermal protection of turbine engine hot end components to have increased life and or better performance. Due to extreme environments and cyclic loads experienced by these components, the TBC may also fail prematurely. Once the TBC fails, it exposes the underlying substrate to very high gas temperatures and the life of the component gets reduced drastically and it can fail within its prescribed service life. This has necessitated the accurate possible estimation of TBC life. The TBC coated transition liner of an aero engine reverse flow combustion chamber has been analysed using finite element approach for life estimation. Stress analysis followed by fatigue analysis is carried out based on a typical mission cycle of the component for life estimation. The approach focuses on the mismatch in thermo-physical properties, operational conditions, Thermally Grown Oxide (TGO) layer surface finish and its growth. Increase in TGO thickness leads to decrease in life — this fact is modelled appropriately and proved using this FEM based methodology. Actual failure data of service engines has also been analysed and compared with that of predicted. This approach can be extended for parametric studies and life evaluation of any TBC system. The present approach will be adopted for qualification of prime reliant TBC for Aero engine application.
APA, Harvard, Vancouver, ISO, and other styles
7

Storey, Margaret-Anne D. "Beyond the Lone Reverse Engineer: Insourcing, Outsourcing and Crowdsourcing." In 2009 16th Working Conference on Reverse Engineering. WCRE 2009. IEEE, 2009. http://dx.doi.org/10.1109/wcre.2009.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Labiche, Yvan, Bojana Kolbah, and Hossein Mehrfard. "Combining Static and Dynamic Analyses to Reverse-Engineer Scenario Diagrams." In 2013 IEEE International Conference on Software Maintenance (ICSM). IEEE, 2013. http://dx.doi.org/10.1109/icsm.2013.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Smith III, James F., and Thanh Vu H. Nguyen. "Genetic program based data mining to reverse engineer digital logic." In Defense and Security Symposium, edited by Belur V. Dasarathy. SPIE, 2006. http://dx.doi.org/10.1117/12.664952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, FengQin, HengJin Ke, and JianBin Liu. "Towards the Reverse Engineer of UML2.0 Sequence Diagram for Procedure Blueprint." In 2009 WRI World Congress on Software Engineering. IEEE, 2009. http://dx.doi.org/10.1109/wcse.2009.128.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Barrier to reverse engineer"

1

Synakowski, E. J., M. A. Beer, and S. H. Batha. Local transport barrier formation and relaxation in reverse-shear plasmas on the TFTR tokamak. Office of Scientific and Technical Information (OSTI), February 1997. http://dx.doi.org/10.2172/304147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography