Searched for: subject%3A%22Reverse%255C+engineering%22
(1 - 3 of 3)
document
Al-Kaswan, A. (author), Ahmed, Toufique (author), Izadi, M. (author), Sawant, Anand Ashok (author), Devanbu, Premkumar (author), van Deursen, A. (author)
Binary reverse engineering is used to understand and analyse programs for which the source code is unavailable. Decompilers can help, transforming opaque binaries into a more readable source code-like representation. Still, reverse engineering is difficult and costly, involving considering effort in labelling code with helpful summaries....
conference paper 2023
document
Oosthoek, K. (author), Dörr, C. (author)
The Cyber Threat Intelligence (CTI) field has evolved rapidly and most of its reporting is now fairly stan-dardized. Where the Cyber Kill Chain was its sole reference framework 5 years ago, today ATT&CK is the de facto standard for reporting adversary tactics, techniques and procedures (TTPs). CTI frameworks are effectively abstraction...
conference paper 2021
document
Harrewijn, T.L. (author), Vergoossen, R.P.H. (author), Lantsoght, E.O.L. (author)
Most bridges in the Dutch infrastructure are built before 1985 and have experienced increasing traffic intensities and loads. On the other hand, the structural (design) codes have changed over the years. A frequently faced problem in practice is that the original design calculations and technical drawings of a large percentage of the existing...
conference paper 2020