Sciweavers

618 search results - page 8 / 124
» A Practical Program Transformation System for Reverse Engine...
Sort
View
108
Voted
DRM
2005
Springer
15 years 3 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
ICSM
2006
IEEE
15 years 3 months ago
Reverse Engineering Method Stereotypes
An approach to automatically identify the stereotypes of all the methods in an entire system is presented. A taxonomy for object-oriented class method stereotypes is given that un...
Natalia Dragan, Michael L. Collard, Jonathan I. Ma...
CORR
2010
Springer
161views Education» more  CORR 2010»
14 years 9 months ago
Database Reverse Engineering based on Association Rule Mining
Maintaining a legacy database is a difficult task especially when system documentation is poor written or even missing. Database reverse engineering is an attempt to recover high-...
Nattapon Pannurat, Nittaya Kerdprasop, Kittisak Ke...
IWPC
2003
IEEE
15 years 2 months ago
Handling Large Search Space in Pattern-Based Reverse Engineering
Large industrial legacy systems are challenges of reverseengineering activities. Reverse-engineering approaches use text-search tools based on regular expressions or work on prese...
Jörg Niere, Jörg P. Wadsack, Lothar Wend...
75
Voted
WCRE
2002
IEEE
15 years 2 months ago
A Study on the Current State of the Art in Tool-Supported UML-Based Static Reverse Engineering
Today, software-engineering research and industry alike recognize the need for practical tools to support reverseengineering activities. Most of the well-known CASE tools support ...
Ralf Kollman, Petri Selonen, Eleni Stroulia, Tarja...