Searched for: department%3A%22Cyber%255C+Security%22
(1 - 2 of 2)
document
Janssen, M. (author)
Software obfuscation is widely applied to prevent reverse engineering of applications. However, to evaluate security and validate behaviour we are interested in analysis such software. In this thesis, we give an overview of available obfuscation techniques as well as methods to undo this effort through reverse engineering and deobfuscation. We...
master thesis 2016
document
Mast, D.E. (author)
We present the design and implementation of a general framework that enables implementation and performance comparison of Authenticated Data Structures (ADSs). The framework guarantees that an ADS supports initialization, updates, and verification of queries. In the framework, we implemented the hash tree, skip list, and state-of-the-art SeqHash...
master thesis 2016