Sciweavers

618 search results - page 8 / 124
» A Practical Program Transformation System for Reverse Engine...
Sort
View
DRM
2005
Springer
15 years 5 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
ICSM
2006
IEEE
15 years 5 months ago
Reverse Engineering Method Stereotypes
An approach to automatically identify the stereotypes of all the methods in an entire system is presented. A taxonomy for object-oriented class method stereotypes is given that un...
Natalia Dragan, Michael L. Collard, Jonathan I. Ma...
CORR
2010
Springer
161views Education» more  CORR 2010»
14 years 11 months ago
Database Reverse Engineering based on Association Rule Mining
Maintaining a legacy database is a difficult task especially when system documentation is poor written or even missing. Database reverse engineering is an attempt to recover high-...
Nattapon Pannurat, Nittaya Kerdprasop, Kittisak Ke...
IWPC
2003
IEEE
15 years 4 months ago
Handling Large Search Space in Pattern-Based Reverse Engineering
Large industrial legacy systems are challenges of reverseengineering activities. Reverse-engineering approaches use text-search tools based on regular expressions or work on prese...
Jörg Niere, Jörg P. Wadsack, Lothar Wend...
WCRE
2002
IEEE
15 years 4 months ago
A Study on the Current State of the Art in Tool-Supported UML-Based Static Reverse Engineering
Today, software-engineering research and industry alike recognize the need for practical tools to support reverseengineering activities. Most of the well-known CASE tools support ...
Ralf Kollman, Petri Selonen, Eleni Stroulia, Tarja...