Using run-time reverse-engineering to optimize DRAM refresh

Author(s):  
Deepak M. Mathew ◽  
Éder F. Zulian ◽  
Matthias Jung ◽  
Kira Kraft ◽  
Christian Weis ◽  
...  
2008 ◽  
Vol 45 ◽  
pp. 161-176 ◽  
Author(s):  
Eduardo D. Sontag

This paper discusses a theoretical method for the “reverse engineering” of networks based solely on steady-state (and quasi-steady-state) data.


2004 ◽  
Vol 62 (12) ◽  
pp. 1057-1063
Author(s):  
A. V. Agranovskiy ◽  
R. E. Agafonov ◽  
R. A. Khadi

Author(s):  
Jeremiah Vanderlaan ◽  
Josh Richert ◽  
James Morrison ◽  
Thomas Doyle

We are a group of engineering students, in our first year of undergraduate study. We have been selected from one thousand first year students and have competed and won the PACE competition. All engineers share a common general first year, but we have been accepted into Civil and Mechanical engineering. This project was assigned as the final project in the Design and Graphics course. The project we are tasked with, called the Cornerstone Design Project, is to first dissect a product, discover how it works, dimension each part and create a fully assembled model using CAD software (Solid Edge V20 in our case). As part of discovering how it works we must benchmark it so the device can be compared with competing products. The goal of the project is to develop a full understanding of part modeling and assembly in Solid Edge, learn proper measurement techniques, and learn the process of reverse engineering and product dissection. All of these tasks were stepping stones to help us fully understand how the device, and all its components, work.


Author(s):  
Johnatan Highlander Câmara Pereira ◽  
Yale Santos ◽  
Nícolas M. F. T. S. Araújo

10.28945/3391 ◽  
2009 ◽  
Author(s):  
Moshe Pelleh

In our world, where most systems become embedded systems, the approach of designing embedded systems is still frequently similar to the approach of designing organic systems (or not embedded systems). An organic system, like a personal computer or a work station, must be able to run any task submitted to it at any time (with certain constrains depending on the machine). Consequently, it must have a sophisticated general purpose Operating System (OS) to schedule, dispatch, maintain and monitor the tasks and assist them in special cases (particularly communication and synchronization between them and with external devices). These OSs require an overhead on the memory, on the cache and on the run time. Moreover, generally they are task oriented rather than machine oriented; therefore the processor's throughput is penalized. On the other hand, an embedded system, like an Anti-lock Braking System (ABS), executes always the same software application. Frequently it is a small or medium size system, or made up of several such systems. Many small or medium size embedded systems, with limited number of tasks, can be scheduled by our proposed hardware architecture, based on the Motorola 500MHz MPC7410 processor, enhancing its throughput and avoiding the software OS overhead, complexity, maintenance and price. Encouraged by our experimental results, we shall develop a compiler to assist our method. In the meantime we will present here our proposal and the experimental results.


Author(s):  
Raditya Faisal Waliulu ◽  
Teguh Hidayat Iskandar Alam

At this paper focus on Malicous Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successfull user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and dissambler body malware.Keyword : forensic malware, Analysis, Advance Presistent Threat, Cyberwar, dissambler


2010 ◽  
Vol 105 (6) ◽  
pp. 606-610
Author(s):  
Christine Schöne ◽  
Ralph Stelzer ◽  
Dietmar Süße ◽  
Ulf Schmidt
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document