Sciweavers

677 search results - page 23 / 136
» Reverse Engineering is Reverse Forward Engineering
Sort
View
98
Voted
WCRE
2008
IEEE
15 years 6 months ago
Data Model Reverse Engineering in Migrating a Legacy System to Java
Central to any legacy migration project is the translation of the data model. Decisions made here will have strong implications to the rest of the translation. Some legacy languag...
Mariano Ceccato, Thomas Roy Dean, Paolo Tonella, D...
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 6 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
WCRE
1999
IEEE
15 years 4 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...
HASE
2008
IEEE
15 years 6 months ago
A Grammar-Based Reverse Engineering Framework for Behavior Verification
A high assurance system requires both functional and nonfunctional correctness before the system is put into operation. To examine whether a system’s actual performance complies...
Chunying Zhao, Kang Zhang
ESWS
2004
Springer
15 years 5 months ago
Reverse Engineering of Relational Databases to Ontologies
Abstract. We propose a novel approach to reverse engineering of relational databases to ontologies. Our approach is based on the idea that semantics of a relational database can be...
Irina Astrova