A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
An approach to automatically identify the stereotypes of all the methods in an entire system is presented. A taxonomy for object-oriented class method stereotypes is given that un...
Natalia Dragan, Michael L. Collard, Jonathan I. Ma...
Maintaining a legacy database is a difficult task especially when system documentation is poor written or even missing. Database reverse engineering is an attempt to recover high-...
Large industrial legacy systems are challenges of reverseengineering activities. Reverse-engineering approaches use text-search tools based on regular expressions or work on prese...
Today, software-engineering research and industry alike recognize the need for practical tools to support reverseengineering activities. Most of the well-known CASE tools support ...
Ralf Kollman, Petri Selonen, Eleni Stroulia, Tarja...