Sciweavers

29 search results - page 1 / 6
» Towards automatic reverse engineering of software security c...
Sort
View
CCS
2008
ACM
13 years 6 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
WCRE
2005
IEEE
13 years 10 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
ICSE
1995
IEEE-ACM
13 years 8 months ago
Reverse Engineering of Legacy Systems: A Path Toward Success
This paper addresses the question of whether the reverse engineering of legacy systems is doomed to failure. Our position is that the answer is highly dependent on the specific go...
Alex Quilici
ECMDAFA
2008
Springer
166views Hardware» more  ECMDAFA 2008»
13 years 6 months ago
Towards Roundtrip Engineering - A Template-Based Reverse Engineering Approach
Model driven development suggests to make models the main artifact in software development. To get executable models in most cases code generation to a "traditional" prog...
Manuel Bork, Leif Geiger, Christian Schneider, Alb...