Sciweavers

5766 search results - page 16 / 1154
» Reverse Engineering of Data
Sort
View
SAC
2006
ACM
15 years 3 months ago
An anomaly-driven reverse proxy for web applications
Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the...
Fredrik Valeur, Giovanni Vigna, Christopher Kr&uum...
ICSE
2010
IEEE-ACM
15 years 2 months ago
Reverse engineering with the reclipse tool suite
Design pattern detection is a reverse engineering methodology that helps software engineers to analyze and understand legacy software by recovering its design and thereby aiding i...
Markus von Detten, Matthias Meyer, Dietrich Travki...
61
Voted
WCRE
1997
IEEE
15 years 1 months ago
Domain Analysis for Transformational Reuse
Domain analysis is an effective technique for enabling both reuse and reverse engineering. This paper shows how domain analysis can provide a framework for combining reverse engin...
Melody M. Moore, Spencer Rugaber
WCRE
2000
IEEE
15 years 2 months ago
Reverse Engineering Tools as Media for Imperfect Knowledge
Reverse engineering is an imperfect process driven by imperfect knowledge. Most current reverse engineering tools do not adequately consider these inherent characteristics. They f...
Jens H. Jahnke, Andrew Walenstein
ICSM
1996
IEEE
15 years 1 months ago
Using Informal and Formal Techniques for the Reverse Engineering of C Programs
Reverse engineering of program code is the process of constructing a higher level abstraction of an implementation in order to facilitate the understanding of a system that may be...
Gerald C. Gannod, Betty H. C. Cheng