Sciweavers

70 search results - page 11 / 14
» Reverse engineering under siege
Sort
View
WSE
2002
IEEE
15 years 4 months ago
Dynamic Model Extraction and Statistical Analysis of Web Applications
The World Wide Web, initially intended as a way to publish static hypertexts on the Internet, is moving toward complex applications. Static Web sites are being gradually replaced ...
Paolo Tonella, Filippo Ricca
102
Voted
JUCS
2006
92views more  JUCS 2006»
14 years 11 months ago
Program Slicing by Calculation
: Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful ...
Nuno F. Rodrigues, Luís Soares Barbosa
ISCI
2007
135views more  ISCI 2007»
14 years 11 months ago
Generalising the array split obfuscation
An obfuscation is a behaviour-preserving program transformation whose aim is to make a program “harder to understand”. Obfuscations are mainly applied to make reverse engineer...
Stephen Drape
138
Voted
ASE
1998
81views more  ASE 1998»
14 years 11 months ago
Program Understanding as Constraint Satisfaction: Representation and Reasoning Techniques
The process of understanding a source code in a high-level programming language involves complex computation. Given a piece of legacy code and a library of program plan templates, ...
Steven G. Woods, Qiang Yang
67
Voted
SIGSOFT
2007
ACM
16 years 12 days ago
Which warnings should I fix first?
Automatic bug-finding tools have a high false positive rate: most warnings do not indicate real bugs. Usually bug-finding tools assign important warnings high priority. However, t...
Sunghun Kim, Michael D. Ernst