Sciweavers

118
Voted
WCRE
2000
IEEE
15 years 4 months ago
Reverse Engineering Tools as Media for Imperfect Knowledge
Reverse engineering is an imperfect process driven by imperfect knowledge. Most current reverse engineering tools do not adequately consider these inherent characteristics. They f...
Jens H. Jahnke, Andrew Walenstein
104
Voted
WCRE
2003
IEEE
15 years 5 months ago
Fuzzy Extensions for Reverse Engineering Repository Models
Reverse Engineering is a process fraught with imperfections. The importance of dealing with non-precise, possibly inconsistent data explicitly when interacting with the reverse en...
Ulrike Kölsch, René Witte
75
Voted
CSMR
2003
IEEE
15 years 5 months ago
Transparent Reverse Engineering Tool Integration Using a Conceptual Transaction Adapter
In this paper we present a proposal for a novel approach to facilitating transparent interoperability among reverse engineering tools. We characterize the architectural and operat...
Dean Jin, James R. Cordy, Thomas R. Dean
91
Voted
WCRE
2005
IEEE
15 years 5 months ago
Toward an Infrastructure to Support Interoperability in Reverse Engineering
In this paper we present an infrastructure that supports interoperability among various reverse engineering tools and applications. We include an Application Programmer’s Interf...
Nicholas A. Kraft, Brian A. Malloy, James F. Power
96
Voted
DRM
2007
Springer
15 years 6 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
110
Voted
IEEEIAS
2007
IEEE
15 years 6 months ago
Metrics-based Evaluation of Slicing Obfuscations
An obfuscation aims to transform a program, without affecting its functionality, so that some secret data within the program can be hidden for as long as possible from an adversar...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
92
Voted
ACISICIS
2007
IEEE
15 years 6 months ago
Slicing Aided Design of Obfuscating Transforms
Abstract—An obfuscation aims to transform a program, without affecting its functionality, so that some secret information within the program can be hidden for as long as possible...
Stephen Drape, Anirban Majumdar, Clark D. Thombors...
99
Voted
ICSE
2007
IEEE-ACM
16 years 10 days ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova