Sciweavers

726 search results - page 23 / 146
» Reverse engineering: a roadmap
Sort
View
WCRE
2007
IEEE
15 years 7 months ago
Reverse Engineering Super-Repositories
Reverse engineering and software evolution research has been focused mostly on analyzing single software systems. However, rarely a project exists in isolation; instead, projects ...
Mircea Lungu, Michele Lanza, Tudor Gîrba, Re...
ICCAD
1996
IEEE
133views Hardware» more  ICCAD 1996»
15 years 5 months ago
Basic concepts for an HDL reverse engineering tool-set
Designer's productivity has become the key-factor of the development of electronic systems. An increasing application of design data reuse is widely recognized as a promising...
Gunther Lehmann, Bernhard Wunder, Klaus D. Mü...
CCS
2008
ACM
15 years 3 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
WISTP
2007
Springer
15 years 7 months ago
Reverse Engineering Java Card Applets Using Power Analysis
Abstract. Power analysis on smart cards is widely used to obtain information about implemented cryptographic algorithms. We propose similar methodology for Java Card applets revers...
Dennis Vermoen, Marc F. Witteman, Georgi Gaydadjie...
WCRE
2008
IEEE
15 years 7 months ago
SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas
Data modeling is an essential part of the software development process, and together with application modeling forms the core of the model-driven approach to software engineering....
Manar H. Alalfi, James R. Cordy, Thomas R. Dean