Sökning: "test execution traces"

Visar resultat 1 - 5 av 7 uppsatser innehållade orden test execution traces.

  1. 1. The utilization of log files generated by test executions: A systematic literature review

    Kandidat-uppsats, Mälardalens universitet/Akademin för innovation, design och teknik

    Författare :Elmi Bile Gabaire; [2023]
    Nyckelord :Software testing; test execution logs; test execution traces; test case generation; test suite optimization;

    Sammanfattning : Context: Testing is an important activity in software development and is typically estimated to account for nearly half of the efforts in the software development cycle. This puts a great demand on improving the artifacts involved in this task such as the test cases and test suites (a collection of test cases). LÄS MER

  2. 2. Reverse Engineering of Deep Learning Models by Side-Channel Analysis

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Xuan Wang; [2023]
    Nyckelord :Side-Channel Attack; Deep Learning; Reverse Engineering; Perceptron Neural Network; Sidokanalattack; Djup lärning; Omvänd Konstruktion; Perceptron Neurala Nätverk;

    Sammanfattning : Side-Channel Analysis (SCA) aims to extract secrets from cryptographic systems by exploiting the physical leakage acquired from implementations of cryptographic algorithms. With the development of Deep Learning (DL), a new type of SCA called Deep Learning Side-Channel Analysis (DLSCA) utilizes the advantages of DL techniques in data features processing to break cryptographic systems more efficiently. LÄS MER

  3. 3. Parasitic Tracking Mobile Wireless Networks

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Bowen Xu; [2021]
    Nyckelord :Location privacy attack and evaluation; mobile network simulation; parasitic attacker; Heuristic LSTM;

    Sammanfattning : Along with the growth and popularity of mobile networks, users enjoy more convenient connection and communication. However, exposure of user presence in mobile networks is becoming a major concern and motivated a plethora of LPPM Location Privacy Protection Mechanisms (LPPMs) have been proposed and analysed, notably considering powerful adversaries with rich data at their disposal, e. LÄS MER

  4. 4. Deep Learning Based Side-Channel Analysis of AES Based on Far Field Electromagnetic Radiation

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Ruize Wang; [2020]
    Nyckelord :Side-Channel Attacks; EM; Far-Field; Deep Learning;

    Sammanfattning : Advanced Encryption Standard (AES) is a widely accepted encryption algorithm used in Internet-of-Things (IoT) devices such as Bluetooth devices. Although the implementation of AES is complicated enough, attackers can still acquire the cryptographic information generated from the AES execution to perform Side-Channel Attack (SCA). LÄS MER

  5. 5. Service Metric Prediction in Clouds using Transfer Learning

    Master-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Nevine Gouda; [2019]
    Nyckelord :;

    Sammanfattning : Cloud service management for telecommunication operators is crucial and challengingespecially in a constantly changing operational execution environment. ThusPerformance models can be used to maintain service quality. LÄS MER