Sökning: "test execution traces"
Visar resultat 1 - 5 av 7 uppsatser innehållade orden test execution traces.
1. The utilization of log files generated by test executions: A systematic literature review
Kandidat-uppsats, Mälardalens universitet/Akademin för innovation, design och teknikSammanfattning : Context: Testing is an important activity in software development and is typically estimated to account for nearly half of the efforts in the software development cycle. This puts a great demand on improving the artifacts involved in this task such as the test cases and test suites (a collection of test cases). LÄS MER
2. Reverse Engineering of Deep Learning Models by Side-Channel Analysis
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Side-Channel Analysis (SCA) aims to extract secrets from cryptographic systems by exploiting the physical leakage acquired from implementations of cryptographic algorithms. With the development of Deep Learning (DL), a new type of SCA called Deep Learning Side-Channel Analysis (DLSCA) utilizes the advantages of DL techniques in data features processing to break cryptographic systems more efficiently. LÄS MER
3. Parasitic Tracking Mobile Wireless Networks
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Along with the growth and popularity of mobile networks, users enjoy more convenient connection and communication. However, exposure of user presence in mobile networks is becoming a major concern and motivated a plethora of LPPM Location Privacy Protection Mechanisms (LPPMs) have been proposed and analysed, notably considering powerful adversaries with rich data at their disposal, e. LÄS MER
4. Deep Learning Based Side-Channel Analysis of AES Based on Far Field Electromagnetic Radiation
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Advanced Encryption Standard (AES) is a widely accepted encryption algorithm used in Internet-of-Things (IoT) devices such as Bluetooth devices. Although the implementation of AES is complicated enough, attackers can still acquire the cryptographic information generated from the AES execution to perform Side-Channel Attack (SCA). LÄS MER
5. Service Metric Prediction in Clouds using Transfer Learning
Master-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : Cloud service management for telecommunication operators is crucial and challengingespecially in a constantly changing operational execution environment. ThusPerformance models can be used to maintain service quality. LÄS MER