Sciweavers

618 search results - page 9 / 124
» A Practical Program Transformation System for Reverse Engine...
Sort
View
94
Voted
WCRE
2005
IEEE
15 years 3 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
78
Voted
DRM
2007
Springer
15 years 3 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
RE
2005
Springer
15 years 3 months ago
Reverse Engineering Goal Models from Legacy Code
A reverse engineering process aims at reconstructing el abstractions from source code. This paper presents a novel reverse engineering methodology for recovering stakeholder goal ...
Yijun Yu, Yiqiao Wang, John Mylopoulos, Sotirios L...
STEP
2005
IEEE
15 years 3 months ago
TETE: A Non-Invasive Unit Testing Framework for Source Transformation
While the use of test-driven development as a debugging, pedagogic, and analytical methodology for objectoriented and procedural systems is well documented, it is a relatively une...
Derek M. Shimozawa, James R. Cordy