Essays about: "test execution traces"
Showing result 1 - 5 of 7 essays containing the words test execution traces.
-
1. The utilization of log files generated by test executions: A systematic literature review
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Context: Testing is an important activity in software development and is typically estimated to account for nearly half of the efforts in the software development cycle. This puts a great demand on improving the artifacts involved in this task such as the test cases and test suites (a collection of test cases). READ MORE
-
2. Reverse Engineering of Deep Learning Models by Side-Channel Analysis
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-Channel Analysis (SCA) aims to extract secrets from cryptographic systems by exploiting the physical leakage acquired from implementations of cryptographic algorithms. With the development of Deep Learning (DL), a new type of SCA called Deep Learning Side-Channel Analysis (DLSCA) utilizes the advantages of DL techniques in data features processing to break cryptographic systems more efficiently. READ MORE
-
3. Parasitic Tracking Mobile Wireless Networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Along with the growth and popularity of mobile networks, users enjoy more convenient connection and communication. However, exposure of user presence in mobile networks is becoming a major concern and motivated a plethora of LPPM Location Privacy Protection Mechanisms (LPPMs) have been proposed and analysed, notably considering powerful adversaries with rich data at their disposal, e. READ MORE
-
4. Deep Learning Based Side-Channel Analysis of AES Based on Far Field Electromagnetic Radiation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Advanced Encryption Standard (AES) is a widely accepted encryption algorithm used in Internet-of-Things (IoT) devices such as Bluetooth devices. Although the implementation of AES is complicated enough, attackers can still acquire the cryptographic information generated from the AES execution to perform Side-Channel Attack (SCA). READ MORE
-
5. Service Metric Prediction in Clouds using Transfer Learning
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Cloud service management for telecommunication operators is crucial and challengingespecially in a constantly changing operational execution environment. ThusPerformance models can be used to maintain service quality. READ MORE