Sciweavers

5766 search results - page 134 / 1154
» Reverse Engineering of Data
Sort
View
ICSE
2005
IEEE-ACM
15 years 10 months ago
Binary refactoring: improving code behind the scenes
We present Binary Refactoring: a software engineering technique for improving the implementation of programs without modifying their source code. While related to regular refactor...
Eli Tilevich, Yannis Smaragdakis
MICRO
2002
IEEE
97views Hardware» more  MICRO 2002»
15 years 3 months ago
Three extensions to register integration
Register integration (or just integration) is a register renaming discipline that implements instruction reuse via physical register sharing. Initially developed to perform squash...
Vlad Petric, Anne Bracy, Amir Roth
SIGADA
2005
Springer
15 years 3 months ago
Using ASIS to generate C++ bindings
In this paper, we describe an approach to automatically creating C++ bindings to Ada libraries utilizing capabilities of the Ada Semantic Interface Specification (ASIS). We discus...
Howard Ausden, Karl A. Nyberg
SEC
2007
14 years 11 months ago
FirePatch: Secure and Time-Critical Dissemination of Software Patches
Because software security patches contain information about vulnerabilities, they can be reverse engineered into exploits. Tools for doing this already exist. As a result, there is...
Håvard D. Johansen, Dag Johansen, Robbert va...
FMOODS
2006
14 years 11 months ago
Modeling and Validation of a Software Architecture for the Ariane-5 Launcher
We present the modeling and validation experiments performed with the IFx validation toolset and with the UML profile developed within the IST Omega project, on a representative sp...
Iulian Ober, Susanne Graf, David Lesens