Data Structure Extraction in Database Reverse Engineering

Author(s):  
J. Henrard ◽  
J. -L. Hainaut ◽  
J. -M. Hick ◽  
D. Roland ◽  
V. Englebert
1995 ◽  
Vol 72 (6) ◽  
pp. 533-541 ◽  
Author(s):  
Colin Fyfe ◽  
Roland Baddeley

Author(s):  
Nur Adila Azram Et.al

The progression of scientific data from various laboratory instruments is increasing these days. As different laboratory instruments hold different structures and formats of data, it became a concern in the management and analysis of data because of the heterogeneity of data structure and format. This paper offered a metadata structure to standardize the laboratory instruments' -produced scientific data to attain a standard structure and format. This paper contains explanation regarding the methodology and the use of proposed metadata structure, before summarizing the implementation and its related result analysis. The proposed metadata structure extraction shows promising results based on conducted evaluation and validation.


1995 ◽  
Vol 72 (6) ◽  
pp. 533-541 ◽  
Author(s):  
Colin Fyfe ◽  
Roland Baddeley

2021 ◽  
Author(s):  
◽  
Kaishuo Yang

<p>Reverse engineering is an important process employed by both attackers seeking to gain entry to a system as well as the security engineers that protect it. While there are numerous tools developed for this purpose, they often can be tedious to use and rely on prior obtained domain knowledge. After examining a number of contemporary tools, we design and implement a de-noising tool that reduces the human effort needed to perform reverse engineering. The tool takes snapshots of a target program's memory as the user consistently interacts with it. By comparing changes across multiple sets of snapshots, consistent changes in memory that could be attributed to the user action are identified. We go on to demonstrate its use on three Windows applications: Minesweeper, Solitaire and Notepad++. Through assistance from the de-noising tool, we were able to discover information such as the location of mines and values of cards in these two games before they are revealed, and the data structure used for input to Notepad++.</p>


2021 ◽  
Author(s):  
◽  
Kaishuo Yang

<p>Reverse engineering is an important process employed by both attackers seeking to gain entry to a system as well as the security engineers that protect it. While there are numerous tools developed for this purpose, they often can be tedious to use and rely on prior obtained domain knowledge. After examining a number of contemporary tools, we design and implement a de-noising tool that reduces the human effort needed to perform reverse engineering. The tool takes snapshots of a target program's memory as the user consistently interacts with it. By comparing changes across multiple sets of snapshots, consistent changes in memory that could be attributed to the user action are identified. We go on to demonstrate its use on three Windows applications: Minesweeper, Solitaire and Notepad++. Through assistance from the de-noising tool, we were able to discover information such as the location of mines and values of cards in these two games before they are revealed, and the data structure used for input to Notepad++.</p>


Author(s):  
Gou-Jen Wang ◽  
Chung-Chang Wang

Abstract In this article, solutions for redundant measured data elimination and surface reconstruction on reverse engineering are presented. In redundant data elimination, we propose a simple algorithm that can efficiently discard those redundant measured points according to the required degree of accuracy. While in the surface reconstruction, we try first convert all eliminated column or row data into spline (B-Spline, Beizer and Cubic-Spline) curves. Methods for two dimensional spline (u, v directions) curve construction are described. Non-meshed two dimensional spline curves are then blended to a surface model by formatting data points into a sparse matrix data structure. Experimental results show that the proposed characteristic points extraction method can remarkably reduce the reconstruction time only on the cost of a little extracting time and minor modeling errors. Comparisons among B-spline, Beizer and Cubic-spline on data structure, computing time, and accuracy demonstrate that the B-spline algorithm is superior to other algorithms in surface reconstruction.


2011 ◽  
Vol 480-481 ◽  
pp. 1536-1541
Author(s):  
Xue Ming He ◽  
Chen Liang Hua ◽  
Cheng Gang Li ◽  
Min Min Ni ◽  
Qing Hua Jin

Surface reconstruction by alpha geometric shape based on triangulation is a new idea and method in computer graphics and reverse engineering. In the process of Topology reconstruction, the points are reduced and projected to a middle slice plane. The adjacency among slices is established by section line subdivision, and triangle mesh is stored and called by the form of STL. The simplexes are classified and computed in order to obtain α interval by the external-ball radius and center of every simplex, and the data structure is designed to save them. Through the man-machine interactive selection modes, α-shape can be reconstructed by different α parameters. The surface reconstruction is completed.


2008 ◽  
Vol 45 ◽  
pp. 161-176 ◽  
Author(s):  
Eduardo D. Sontag

This paper discusses a theoretical method for the “reverse engineering” of networks based solely on steady-state (and quasi-steady-state) data.


Sign in / Sign up

Export Citation Format

Share Document