Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

Browse all Theses and Dissertations

Reverse engineering

Publication Year

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Accelerating Reverse Engineering Image Processing Using Fpga, Matthew Joshua Harris Jan 2019

Accelerating Reverse Engineering Image Processing Using Fpga, Matthew Joshua Harris

Browse all Theses and Dissertations

In recent decades, field programmable gate arrays (FPGAs) have evolved beyond simple, expensive computational components with minimal computing power to complex, inexpensive computational engines. Today, FPGAs can perform algorithmically complex problems with improved performance compared to sequential CPUs by taking advantage of parallelization. This concept can be readily applied to the computationally dense field of image manipulation and analysis. Processed on a standard CPU, image manipulation suffers with large image sets processed by highly sequential algorithms, but by carefully adhering to data dependencies, parallelized FPGA functions or kernels offer the possibility of significant improvement through threaded CPU functions. This thesis …


Static Evaluation Of Type Inference And Propagation On Global Variables With Varying Context, Ivan Frasure Jan 2019

Static Evaluation Of Type Inference And Propagation On Global Variables With Varying Context, Ivan Frasure

Browse all Theses and Dissertations

Software reverse engineering (SRE) is a broad field with motivations ranging from verifying or documenting gordian source code files to understanding and reimplementing binary object files and executables. SRE of binaries is exceptionally compelling and challenging due to large amounts of information that can be lost in the compilation progress. A central area in SRE is type inference. Type inference is built around a fundamental step in understanding the behavior of a binary, recovering the types of data in the program. Type inference has many unique techniques in both static and dynamic type inference systems that have been implemented in …


A Stochastic Petri Net Reverse Engineering Methodology For Deep Understanding Of Technical Documents, Giorgia Rematska Jan 2018

A Stochastic Petri Net Reverse Engineering Methodology For Deep Understanding Of Technical Documents, Giorgia Rematska

Browse all Theses and Dissertations

Systems Reverse Engineering has gained great attention over time and is associated with numerous different research areas. The importance of this research derives from several technological necessities. Security analysis and learning purposes are two of them and can greatly benefit from reverse engineering. More specifically, reverse engineering of technical documents for deeper automatic understanding is a research area where reverse engineering can contribute a lot. In this PhD dissertation we develop a novel reverse engineering methodology for deep understanding of architectural description of digital hardware systems that appear in technical documents. Initially, we offer a survey on reverse engineering of …


Image Stitching And Matching Tool In The Automated Iterative Reverse Engineer (Aire) Integrated Circuit Analysis Suite, David C. Bowman Jan 2018

Image Stitching And Matching Tool In The Automated Iterative Reverse Engineer (Aire) Integrated Circuit Analysis Suite, David C. Bowman

Browse all Theses and Dissertations

Due to current market forces, leading-edge semiconductor fabrication plants have moved outside of the US. While this is not a problem at first glance, when it comes to security-sensitive applications, over-production, device cloning, or design alteration becomes a possibility. Since these vulnerabilities exist during the fabrication phase, a Reverse Engineering (RE) step must be introduced to help ensure secure device operation. This thesis proposes several unique methods and a collection of tools to ensure trust assurance in integrated circuit design by detecting fabrication flaws and possible hardware Trojans using several image processing techniques; fused into a singular view of the …