Sciweavers

15 search results - page 2 / 3
» wcre 2010
Sort
View
WCRE
2010
IEEE
13 years 3 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
WCRE
2010
IEEE
13 years 3 months ago
Mining Source Code for Structural Regularities
Abstract—During software development, design rules and contracts in the source code are often encoded through regularities, such as API usage protocols, coding idioms and naming ...
Angela Lozano, Andy Kellens, Kim Mens, Gabriela Ar...
WCRE
2010
IEEE
13 years 3 months ago
Understanding Feature Evolution in a Family of Product Variants
Existing software product variants, developed by ad hoc reuse such as copy-paste-modify, are often a starting point for building Software Product Line (SPL). Understanding of how ...
Yinxing Xue, Zhenchang Xing, Stan Jarzabek
WCRE
2010
IEEE
13 years 3 months ago
Immediacy through Interactivity: Online Analysis of Run-time Behavior
—Visualizations of actual run-time data support the comprehension of programs, like examples support the ion of abstract concepts and principles. Unfortunately, the required run-...
Michael Perscheid, Bastian Steinert, Robert Hirsch...
WCRE
2010
IEEE
13 years 3 months ago
Evaluating the Impact of Software Evolution on Software Clustering
—The evolution of a software project is a rich data source for analyzing and improving the software development process. Recently, several research groups have tried to cluster s...
Fabian Beck, Stephan Diehl