Sciweavers

29 search results - page 1 / 6
» Towards automatic reverse engineering of software security c...
Sort
View
98
Voted
CCS
2008
ACM
15 years 5 days ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
WCRE
2005
IEEE
15 years 3 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
82
Voted
ICSE
1995
IEEE-ACM
15 years 1 months ago
Reverse Engineering of Legacy Systems: A Path Toward Success
This paper addresses the question of whether the reverse engineering of legacy systems is doomed to failure. Our position is that the answer is highly dependent on the specific go...
Alex Quilici
120
Voted
ECMDAFA
2008
Springer
166views Hardware» more  ECMDAFA 2008»
14 years 12 months ago
Towards Roundtrip Engineering - A Template-Based Reverse Engineering Approach
Model driven development suggests to make models the main artifact in software development. To get executable models in most cases code generation to a "traditional" prog...
Manuel Bork, Leif Geiger, Christian Schneider, Alb...