Author:Burke, Ivan D; Pieterse, HeloiseDate:Mar 2015The Android mobile market has expanded greatly in recent years, but with its increased market share Android became a popular target for malware developers. The latest Anti-Virus reports suggest that Android account for the majority of malware ...Read more
Author:Roos, TH; Quin, RL; De Beer, FC; Nshimirimana, RMDate:Sep 2011Probably the most common method of reverse engineering in mechanical engineering involves measuring the physical geometry of a component using a coordinate measuring machine (CMM). Neutron tomography, in contrast, is used primarily as a ...Read more
Author:Schenker, R; De Beer, DJ; Du Preez, WB; Thomas, ME; Richter, PWDate:Aug 1999The technologies of reverse engineering and rapid prototyping are emerging as useful new tools in medicine. One application is of particular interest in orthopaedic, dental and reconstructive surgery. It involves the imaging, modelling and ...Read more
Author:Djonon Tsague, Hippolyte; Twala, BDate:Dec 2016From inception, side channel leakage has been widely used for the purposes of extracting secret information, such as cryptographic keys, from embedded devices. However, in a few instances it has been utilized for extracting other information ...Read more