Sciweavers

618 search results - page 18 / 124
» A Practical Program Transformation System for Reverse Engine...
Sort
View
ESSOS
2009
Springer
15 years 4 months ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
99
Voted
WCRE
2006
IEEE
15 years 5 months ago
An Orchestrated Multi-view Software Architecture Reconstruction Environment
Most approaches in reverse engineering literature generate a single view of a software system that restricts the scope of the reconstruction process. We propose an orchestrated se...
Kamran Sartipi, Nima Dezhkam, Hossein Safyallah
SCAM
2005
IEEE
15 years 5 months ago
Pointer Analysis for Source-to-Source Transformations
We present a pointer analysis algorithm designed for source-to-source transformations. Existing techniques for pointer analysis apply a collection of inference rules to a dismantl...
Marcio Buss, Stephen A. Edwards, Bin Yao, Dan G. W...
ICSE
2005
IEEE-ACM
15 years 11 months ago
Object naming analysis for reverse-engineered sequence diagrams
UML sequence diagrams are commonly used to represent object interactions in software systems. This work considers the problem of extracting UML sequence diagrams from existing cod...
Atanas Rountev, Beth Harkness Connell
ASWEC
2008
IEEE
15 years 1 months ago
Embedding Architectural Practices into Extreme Programming
Today, agile methods become a popular approach to develop software systems. They try to satisfy customer, respond to changes, release in less time and achieve suitable profits for...
Amir Azim Sharifloo, Amir S. Saffarian, Fereidoon ...