Searched for: subject%3A%22Reverse%255C+engineering%22
(1 - 20 of 26)

Pages

document
Yaakoub, Mohamed (author)
Aero engines are critical components in aviation, relying on thermodynamics to convert fuel energy into thrust. Maintenance of these engines constitutes a significant portion of operational costs. Gas path analysis (GPA) is essential for engine health management, relying on performance modeling to simulate engine operations accurately. This...
master thesis 2023
document
Al-Kaswan, A. (author), Ahmed, Toufique (author), Izadi, M. (author), Sawant, Anand Ashok (author), Devanbu, Premkumar (author), van Deursen, A. (author)
Binary reverse engineering is used to understand and analyse programs for which the source code is unavailable. Decompilers can help, transforming opaque binaries into a more readable source code-like representation. Still, reverse engineering is difficult and costly, involving considering effort in labelling code with helpful summaries....
conference paper 2023
document
Chen, Yi Hsien (author), Lin, Si Chen (author), Huang, S. (author), Lei, Chin Laung (author), Huang, Chun Ying (author)
Malicious binaries have caused data and monetary loss to people, and these binaries keep evolving rapidly nowadays. With tons of new unknown attack binaries, one essential daily task for security analysts and researchers is to analyze and effectively identify malicious parts and report the critical behaviors within the binaries. While manual...
journal article 2023
document
Al-Kaswan, Ali (author)
Reverse engineering binaries is required to understand and analyse programs for which the source code is unavailable. Decompilers can transform the largely unreadable binaries into a more readable source code-like representation. However, many aspects of source code, such as variable names and comments, are lost during the compilation and...
master thesis 2022
document
de Jong, Victor (author)
Applications on Android phones which block spam calls could be argued a necessity for people unfortunate enough to have their number on spam lists. Third-party applications provide exten- sive, up-to-date blocklists to screen incoming calls. This paper analyses and describes how these types of applications store and access their data. First we...
bachelor thesis 2022
document
Pashov, Atanas (author)
The aim of this research is to provide a structured approach for dynamically analysing Android applications, focusing on applications that block or flag suspected spam caller IDs. This paper discusses ways to determine how an application stores the data regarding the phone numbers, and what APIs it utilizes. In order to develop a methodology of...
bachelor thesis 2022
document
Grosveld, Marcus (author)
The conflictual past of Beirut is being erased by the company of Solidere, which has a strong will to modernise, through a highly destructive reconstruction, in an effort to heal the city. With this project, a new approach is taken on, in which an old concrete structure, riddled with bullet holes, part of the great variety of dilapidated and...
master thesis 2021
document
Breurkes, Arthur (author)
Database entity type recognition is the practice of recognizing conceptual entity types for which given data sets contain data. In big data or data lake settings, it is not always known which conceptual entity types are represented in each data set, making it difficult to extract value from the data. Depending on the logical schemas, each...
master thesis 2021
document
Baldi, N. (author), de Valk, S.C. (author), Sousa-Silva, Maria (author), Casal, Margarida (author), Soares-Silva, Isabel (author), Mans, R. (author)
In Saccharomyces cerevisiae, the complete set of proteins involved in transport of lactic acid across the cell membrane has not been determined. In this study, we aimed to identify transport proteins not previously described to be involved in lactic acid transport via a combination of directed evolution, whole-genome resequencing and reverse...
journal article 2021
document
Oosthoek, K. (author), Dörr, C. (author)
The Cyber Threat Intelligence (CTI) field has evolved rapidly and most of its reporting is now fairly stan-dardized. Where the Cyber Kill Chain was its sole reference framework 5 years ago, today ATT&CK is the de facto standard for reporting adversary tactics, techniques and procedures (TTPs). CTI frameworks are effectively abstraction...
conference paper 2021
document
Harrewijn, T.L. (author), Vergoossen, R.P.H. (author), Lantsoght, E.O.L. (author)
Most bridges in the Dutch infrastructure are built before 1985 and have experienced increasing traffic intensities and loads. On the other hand, the structural (design) codes have changed over the years. A frequently faced problem in practice is that the original design calculations and technical drawings of a large percentage of the existing...
conference paper 2020
document
Eigenraam, P. (author), Borgart, A. (author), Chilton, John (author), Li, Qingpeng (author)
This paper presents a detailed structural analysis of a bubble shell engineered by Heinz Isler. Through 3D scanning the geometry of this shell structure has become available to the authors. Structural analysis has not been possible before since the geometry of the shell was not available. The bubble shell was Isler’s most built type of shell. In...
journal article 2020
document
Harrewijn, Thomas (author)
Most bridges in the Western European road networks are ageing. The vast majority of about 90% of these bridges have reinforced concrete as a building material. The traffic intensity, as well as the axle, and the average vehicle weight have increased since these structures were opened to traffic. Furthermore, the structural (design) codes have...
master thesis 2019
document
de Haan, Mick (author)
Architectural engineering is evolving from a traditional craftsmanship to a new digital craftsmanship. Through advancements in production and processing techniques, we can achieve both mass production and offer mass customisation. As for the typology shown below, a simple house [1] & [2], the source of the material did not alter. The...
master thesis 2017
document
Marques, W.L. (author), Mans, R. (author), Marella, Eko Roy (author), Cordeiro, Rosa Lorizolla (author), van den Broek, M.A. (author), Daran, J.G. (author), Pronk, J.T. (author), Gombert, Andreas K. (author), van Maris, A.J.A. (author)
Many relevant options to improve efficacy and kinetics of sucrose metabolism in Saccharomyces cerevisiae and, thereby, the economics of sucrose-based processes remain to be investigated. An essential first step is to identify all native sucrose-hydrolysing enzymes and sucrose transporters in this yeast, including those that can be activated...
journal article 2017
document
Janssen, M. (author)
Software obfuscation is widely applied to prevent reverse engineering of applications. However, to evaluate security and validate behaviour we are interested in analysis such software. In this thesis, we give an overview of available obfuscation techniques as well as methods to undo this effort through reverse engineering and deobfuscation. We...
master thesis 2016
document
Eigenraam, P. (author), Borgart, A. (author)
Many free form shell structures that have been designed and build in previous decades are fascinating structures. We can learn from these structures by analysing them and studying their structural behaviour. However, in some cases the geometry of these structures is not available; most notably the shapes of shell structures designed and build by...
journal article 2016
document
Oud, B. (author), Guadalupe-Medina, V. (author), Nijkamp, J.F. (author), De Ridder, D. (author), Pronk, J.T. (author), Van Maris, A.J.A. (author), Daran, J.G. (author)
Laboratory evolution of the yeast Saccharomyces cerevisiae in bioreactor batch cultures yielded variants that grow as multicellular, fast-sedimenting clusters. Knowledge of the molecular basis of this phenomenon may contribute to the understanding of natural evolution of multicellularity and to manipulating cell sedimentation in laboratory and...
journal article 2013
document
Greiler, M.S. (author)
The two main topics of this dissertation are plug-in-based systems and test suite comprehension. In particular, challenges during testing plug-in-based systems are revealed, and reverse engineering based techniques to support developers during test suite comprehension are presented.
doctoral thesis 2013
document
Zaidman, A.E. (author), Matthijssen, N. (author), Storey, M.A. (author), Van Deursen, A. (author)
Ajax-enabled Web applications are a new breed of highly interactive, highly dynamic Web applications. Although Ajax allows developers to create rich Web applications, Ajax applications can be difficult to comprehend and thus to maintain. For this reason, we have created FireDetective, a tool that uses dynamic analysis at both the client (browser...
journal article 2012
Searched for: subject%3A%22Reverse%255C+engineering%22
(1 - 20 of 26)

Pages