Sciweavers

WCRE
2005
IEEE
15 years 2 months ago
Design Pattern Detection in Eiffel Systems
The use of design patterns in a software system can provide strong indications about the rationale behind the system’s design. As a result, automating the detection of design pa...
Wei Wang, Vassilios Tzerpos
WCRE
2005
IEEE
15 years 2 months ago
Diagnosing Design Problems in Object Oriented Systems
Software decay is a phenomenon that plagues aging software systems. While in recent years, there has been significant progress in the area of automatic detection of “code smells...
Adrian Trifu, Radu Marinescu
WCRE
2005
IEEE
15 years 2 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
WCRE
2005
IEEE
15 years 2 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
WCRE
2005
IEEE
15 years 2 months ago
Search-Based Amorphous Slicing
Deji Fatiregun, Mark Harman, Robert M. Hierons
Software Engineering
Top of PageReset Settings