A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2004; you can also visit the original URL.
The file type is application/pdf
.
Filters
Research challenges in the reverse engineering community
Proceedings 9th International Workshop on Program Comprehension. IWPC 2001
This working session will discuss future directions for research and practice in software reverse engineering and reengineering, including the challenging issues of program transformation, dealing with ...
net-centric applications, and improving the maturity of the reverse engineering process. ...
In this context, several research challenges arise. An evolvable base of understanding is needed to ease software change and avoid desperate reverse engineering. ...
doi:10.1109/wpc.2001.921742
dblp:conf/iwpc/Wong01
fatcat:selowyhgwza6hivbx3zap2al4a
The Central Role of Neuroinformatics in the National Academy of Engineering's Grandest Challenge: Reverse Engineer the Brain
2009
Neuroinformatics
The reverse is also true: advances in virtual reality will certainly assist us in addressing the ninth challenge. ...
At the same time, reverse engineering the brain is also a quintessential step in understanding the human mind. ...
doi:10.1007/s12021-008-9043-9
pmid:19140032
pmcid:PMC2726926
fatcat:nabzbbwybvd4bkz77mefx4k5ia
Workshop on Mining Unstructured Data (MUD) because "Mining Unstructured Data is Like Fishing in Muddy Waters"!
2010
2010 17th Working Conference on Reverse Engineering
We feel that the knowledge gathered by these research efforts should be consolidated and propagated to the empirical software engineering communities. ...
Historically, structured development artifacts such as source code have been the primary focus of software engineering research, but the last couple of years have seen a dramatic increase of research on ...
The introductory presentation situates mining unstructured data in the context of reverse-engineering, whereas the keynote speaker provides a general overview of the major accomplishments and challenges ...
doi:10.1109/wcre.2010.39
dblp:conf/wcre/BettenburgA10
fatcat:uleeomobardp3epd34h7sl7cte
An Exploratory Study of Software Reverse Engineering in a Security Context
2011
2011 18th Working Conference on Reverse Engineering
The security-sensitive nature of these tasks, such as the understanding of malware or the decryption of encrypted content, brings unique challenges to reverse engineering: work has to be done offline, ...
To help us gain an understanding of this reverse engineering work, we report on an exploratory study done in a security context at a research and development government organization to explore their work ...
ACKNOWLEDGEMENTS We wish to thank the participants in this study for conducting interviews with us, and we appreciate the feedback from Cassandra Petrachenko that helped improve this paper. ...
doi:10.1109/wcre.2011.30
dblp:conf/wcre/TreudeFSS11
fatcat:d5o4rca4jvdv5pvwknm53hj624
3rd workshop on Mining Unstructured Data
2013
2013 20th Working Conference on Reverse Engineering (WCRE)
To extract such a knowledge, past software engineering research has extensively focused on mining the source code, i.e., the final product of the development effort. ...
Although research communities in Information Retrieval, Data Mining and Natural Language Processing have devised techniques to deal with unstructured data, these techniques are usually limited in scope ...
Michele Lanza in the REVEAL (Reverse Engineering, Visualization, Evolution Analysis Lab) research group. ...
doi:10.1109/wcre.2013.6671333
dblp:conf/wcre/BacchelliBGH13
fatcat:jnrs75jmmnc3vgpglw363nmvjy
Message from the General Chair: On the Meeting of Software Architecture and Reverse Engineering
2005
12th Working Conference on Reverse Engineering (WCRE'05)
These are topics that we should consider as the software architecture community members of 2005 meets with their counterparts in the reverse engineering community of 2005. ...
WICSA has a similar role, in its part of the software engineering community, as the leading gathering of software architecture researchers and practitioners. ...
doi:10.1109/wcre.2005.22
dblp:conf/wcre/X05a
fatcat:ewkwt6wy2rbvpe4bbl6xj64pcu
Workshop on open and original problems in software language engineering
2013
2013 20th Working Conference on Reverse Engineering (WCRE)
The OOPSLE workshop is a discussion-oriented and collaborative forum for formulating and addressing with open, unsolved and unsolvable problems in software language engineering (SLE), which is a research ...
We also plan to formulate promising language-related challenges to organise in the future. ...
September 2013. http://professor-fish. blogspot.de/2013/09/an-annotated-and-illustrated.html. of researchers in software language engineering and reverse engineering. ...
doi:10.1109/wcre.2013.6671334
dblp:conf/wcre/BaggeZ13
fatcat:usbq3qknkvgmjlhyuwjplvd4ru
Protocol Reverse Engineering: Challenges and Obfuscation
[chapter]
2017
Lecture Notes in Computer Science
The aim of this paper is 1) to present an overview of the main challenges related to reverse engineering, and 2) to introduce the use of obfuscation techniques to make the reverse engineering process more ...
Reverse engineering of communication protocols is aimed at providing methods and tools allowing to infer a model of these protocols. ...
Protocol reverse engineering challenges Protocol reverse engineering raises several challenges. ...
doi:10.1007/978-3-319-54876-0_11
fatcat:4r3fnbkg2zd6dlsgwjaxlctbcy
International workshop on open and original problems in software language engineering
2014
2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE)
Journal submissions will undergo peer review by the members of the program committee consisting of researchers in software language engineering and reverse engineering. ...
Some research fields have a list of acknowledged open problems slowly addressed by the community: Hilbert's problems 1 , the POPLmark Challenge 2 , a list of open problems in Boolean grammars 3 , etc - ...
doi:10.1109/csmr-wcre.2014.6747223
dblp:conf/csmr/BaggeZ14
fatcat:6kknqnzmlzf35gqfqiiqzocyqi
Introduction to the special issue on reverse engineering (WCRE 2008)
2009
Journal of Software Maintenance and Evolution Research and Practice
Each year, researchers gather at WCRE to present the latest advances in reverse engineering, with contributions in the areas of binary reverse engineering, static analysis, dynamic analysis, software repository ...
While still a relatively young field, the reverse engineering community is thriving and as a result there is now a substantial body of work that has been conducted in the area with important results. ...
Introduction to the Special Issue on Reverse Engineering (WCRE 2008)
EDITORIAL
Mining Software Repositories Historical code changes contain valuable information that help developers when performing ...
doi:10.1002/smr.420
fatcat:mnqtmfkhnfegjmv2bxvwxnysfe
Reverse Engineering of Communications Networks: Evolution and Challenges
[article]
2017
arXiv
pre-print
Reverse engineering of a communications network is the process of identifying the communications protocol used in the network. ...
Furthermore, challenges and open research issues in this field are introduced. ...
Furthermore, we highlighted challenges and open research issues in the field reverse engineering of communications networks. ...
arXiv:1704.05432v1
fatcat:dedqf22v4zg3rhs4tws54dl5tm
Software Reverse Engineering in the Domain of Complex Embedded Systems
[chapter]
2012
Reverse Engineering - Recent Advances and Applications
Dynamic analyses Research into dynamic analyses have increasingly received more attention in the reverse engineering community. ...
Along with other software engineering areas, reverse engineering research should take up this challenge. ...
doi:10.5772/33586
fatcat:cutc7knbajcq5mp6kh7yd7wehu
FAMOOSr 2009 - Workshop on FAMIX and Moose in Software Reengineering
2009
2009 16th Working Conference on Reverse Engineering
The goal of this half-day workshop is to strengthen the community of researchers and practitioners who are working in re-and reverse engineering, by providing a forum for building future research starting ...
The increasing amount of data available about software systems poses new challenges for re-and reverse engineering research, as the proposed approaches need to scale. ...
The target audience in this case are researchers and industry practitioners with an interest in reverse and re-engineering software systems. ...
doi:10.1109/wcre.2009.56
dblp:conf/wcre/DenierG99a
fatcat:f5bvyr3z35haxe4femtymh4bku
State of the art of network protocol reverse engineering tools
2017
Journal in Computer Virology and Hacking Techniques
After identifying key challenges, the paper presents a survey of protocol reverse engineering tools developed in the last decade. ...
Moreover, keeping pace with a protocol evolutions was a real challenge. Supporting interoperability is not the only motivation for using reverse engineering. ...
Protocol reverse engineering challenges Protocol reverse engineering raises several challenges, not all of them are relevant for each study. ...
doi:10.1007/s11416-016-0289-8
fatcat:bybg6liixbbodekvt2tvrllffi
FAMOOSr 2008: Workshop on FAMIX and Moose in Software Reengineering
2008
2008 15th Working Conference on Reverse Engineering
The goal of this half-day workshop is to strengthen the community of researchers and practitioners who are working in re-and reverse engineering, by providing a forum for building future research starting ...
The increasing amount of data available about software systems poses new challenges for re-and reverse engineering research, as the proposed approaches need to scale. ...
The target audience in this case are researchers and industry practitioners with an interest in reverse and re-engineering software systems. ...
doi:10.1109/wcre.2008.51
dblp:conf/wcre/DucasseGGLN08
fatcat:goreq7wefjabjmltgedv4sb2lq
« Previous
Showing results 1 — 15 out of 228,398 results