B. Bedeutung und Ursprung des Reverse Engineering

2022 ◽  
pp. 23-39
Author(s):  
Armin Strobel
Keyword(s):  
2008 ◽  
Vol 45 ◽  
pp. 161-176 ◽  
Author(s):  
Eduardo D. Sontag

This paper discusses a theoretical method for the “reverse engineering” of networks based solely on steady-state (and quasi-steady-state) data.


2004 ◽  
Vol 62 (12) ◽  
pp. 1057-1063
Author(s):  
A. V. Agranovskiy ◽  
R. E. Agafonov ◽  
R. A. Khadi

Author(s):  
Jeremiah Vanderlaan ◽  
Josh Richert ◽  
James Morrison ◽  
Thomas Doyle

We are a group of engineering students, in our first year of undergraduate study. We have been selected from one thousand first year students and have competed and won the PACE competition. All engineers share a common general first year, but we have been accepted into Civil and Mechanical engineering. This project was assigned as the final project in the Design and Graphics course. The project we are tasked with, called the Cornerstone Design Project, is to first dissect a product, discover how it works, dimension each part and create a fully assembled model using CAD software (Solid Edge V20 in our case). As part of discovering how it works we must benchmark it so the device can be compared with competing products. The goal of the project is to develop a full understanding of part modeling and assembly in Solid Edge, learn proper measurement techniques, and learn the process of reverse engineering and product dissection. All of these tasks were stepping stones to help us fully understand how the device, and all its components, work.


Author(s):  
Johnatan Highlander Câmara Pereira ◽  
Yale Santos ◽  
Nícolas M. F. T. S. Araújo

Author(s):  
Raditya Faisal Waliulu ◽  
Teguh Hidayat Iskandar Alam

At this paper focus on Malicous Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successfull user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and dissambler body malware.Keyword : forensic malware, Analysis, Advance Presistent Threat, Cyberwar, dissambler


2010 ◽  
Vol 105 (6) ◽  
pp. 606-610
Author(s):  
Christine Schöne ◽  
Ralph Stelzer ◽  
Dietmar Süße ◽  
Ulf Schmidt
Keyword(s):  

2018 ◽  
Vol 11 (2) ◽  
pp. 61
Author(s):  
Abdillah Zuhud ◽  
Sukmaji Indro Cahyono ◽  
Dominikus Danardono Dwi Prija Tjahyana
Keyword(s):  

Daerah tertinggal adalah daerah yang terisolasi secara geografis yang memiliki aksesibilitas sangat rendah. Sebagian besar wilayahnya memiliki tingkat populasi dan kelistrikan yang rendah karena aksesibilitasnya sangat jauh dari jaringan tenaga nasional. Masalah listrik di daerah tertinggal bisa diatasi dengan membangun pembangkit listrik tenaga piko hidro. Salah satu komponen penting piko hidro adalah runner turbin. Berdasarkan proses perancangan teoritis yang mengacu pada laju alir variabel tetap 25 l/s, head 2 m dan jumlah putaran turbin 1500 rpm maka diperoleh runner diameter luar turbin propeller adalah 0,103m, diameter hub 0,515m, jumlah blade adalah 4 dengan profil blade datar, efisiensi hidrolik 76% dan ditargetkan untuk meningkatkan tenaga listrik 490 Watt.


2011 ◽  
Vol 21 (11) ◽  
pp. 2701-2710
Author(s):  
Hui LIU ◽  
Wei-Zhong SHAO ◽  
Zhi-Yi MA

Sign in / Sign up

Export Citation Format

Share Document