Sciweavers

42 search results - page 7 / 9
» Reverse Engineering of Legacy Code Exposed
Sort
View
ASE
2007
143views more  ASE 2007»
13 years 5 months ago
Composition inference for UML class diagrams
Knowing which associations are compositions is important in a tool for the reverse engineering of UML class diagrams. Firstly, recovery of composition relationships bridges the ga...
Ana Milanova
SP
2006
IEEE
193views Security Privacy» more  SP 2006»
13 years 11 months ago
Analysis of the Linux Random Number Generator
Linux is the most popular open source project. The Linux random number generator is part of the kernel of all Linux distributions and is based on generating randomness from entrop...
Zvi Gutterman, Benny Pinkas, Tzachy Reinman
CCS
2010
ACM
13 years 4 months ago
TAPS: automatically preparing safe SQL queries
We present the first sound program transformation approach for automatically transforming the code of a legacy web application to employ PREPARE statements in place of unsafe SQL...
Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakris...
KBSE
2005
IEEE
13 years 11 months ago
Timna: a framework for automatically combining aspect mining analyses
To realize the benefits of Aspect Oriented Programming (AOP), developers must refactor active and legacy code bases into an AOP language. When refactoring, developers first need...
David Shepherd, Jeffrey Palm, Lori L. Pollock, Mar...
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 1 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson