Filters








116,363 Hits in 4.5 sec

The small world of software reverse engineering

A.E. Hassan, R.C. Holt
11th Working Conference on Reverse Engineering  
Research in maintenance and reengineering has flourished and evolved into a central part of software engineering research worldwide.  ...  In this paper, we have a look at this research community through the publications of its members in several international conferences.  ...  The authors would like to acknowledge the suggestions by several of the WCRE atten-dees who stopped by our demo on the last day.  ... 
doi:10.1109/wcre.2004.37 dblp:conf/wcre/HassanH04 fatcat:cb4tk4uyvff6fpjhvdccbxklri

Why teach reverse engineering?

Muhammad Raza Ali
2005 Software engineering notes  
Software reverse engineering is a fascinating discipline of software engineering. But it has failed to attract attention from students.  ...  I will start with a brief overview of reverse engineering concepts, and then discuss advantages of teaching reverse engineering.  ...  As reverse engineering encourages thinking 'out of the box'. Software piracy and illegal reversing of the disassembly has been a major concern for the software manufacturers.  ... 
doi:10.1145/1082983.1083004 fatcat:z7ifldjiz5hi7hhgfiav5xmtf4

Reverse Engineering in Product Manufacturing: An Overview [chapter]

A. Kumar, P. K. Jain, P. M. Pathak
2013 DAAAM International Scientific Book 2013  
Reverse engineering plays vital role in the branch of the mechanical design and manufacturing based industry.  ...  In reverse engineering approach the important steps involved, are characterizations of geometric models and related surface representations, segmentation and surface fitting of simple and free-form shapes  ...  Software Industry Software reverse engineering is concerned with the analysis of an existing system The IEEE Standard for Software Maintenance (IEEE Std 1219-1993) defines reverse engineering as "the process  ... 
doi:10.2507/daaam.scibook.2013.39 fatcat:zsvquabj35aubhqukivz5bff24

Reverse engineering is reverse forward engineering

Ira D. Baxter, Michael Mehlich
2000 Science of Computer Programming  
As an example, a small fragment of a real-time operating system is reverse-engineered using this approach.  ...  A byproduct of the transformational reverse engineering process is a design database for the program that then can be maintained to minimize the need for further reverse engineering during the remaining  ...  Such a system, called the Design Maintenance System (DMS), which is intended for handling commercial size software, is currently under development at Semantic Designs.  ... 
doi:10.1016/s0167-6423(99)00034-9 fatcat:raewl56pbnd7rfgdfnqqwv3z3q

Interactive Exploration of UML Sequence Diagrams

R. Sharp, A. Rountev
2005 3rd IEEE International Workshop on Visualizing Software for Understanding and Analysis  
These techniques allow a programmer to explore interactively various aspects of large real-world sequence diagrams in order to gain insights about the behavior of the underlying software.  ...  Reverse-engineered sequence diagrams, which are constructed from existing code, are becoming widely available to more programmers through modern commercial and research UML tools.  ...  Reverse-engineered sequence diagrams also provide essential insights for software understanding and maintenance of large-scale software systems.  ... 
doi:10.1109/vissof.2005.1684295 dblp:conf/vissoft/SharpR05 fatcat:3gd77yhp3ngppiidzua5zwrhza

The Metric Lens: Visualizing Metrics and Structure on Software Diagrams

Heorhiy Byelas, Alexandru Telea
2008 2008 15th Working Conference on Reverse Engineering  
We illustrate our technique and tool by a sample complexity assessment analysis of a real-world C++ software system.  ...  We present the metric lens, a new visualization of methodlevel code metrics atop UML class diagrams, which allows performing metric-metric and metric-structure correlations on large diagrams.  ...  Section 3 shows a case study of our technique in understanding a real-world software system. Section 4 discusses the results and future work directions.  ... 
doi:10.1109/wcre.2008.26 dblp:conf/wcre/ByelasT08 fatcat:tpf2tlrim5gyfd22uvwtfh73te

On the Role of Metadata in Visual Language Reuse and Reverse Engineering – An Industrial Case

Mika Karaila, Tarja Systä
2005 Electronical Notes in Theoretical Computer Science  
Collecting metadata on a family of programs is useful not only for generating statistical data on the programs but also for future re-engineering and reuse purposes.  ...  Metadata stored in a database is used to provide advanced program analysis support; from the large amount of programs, the metadata allows focusing the analysis to certain kinds of programs.  ...  With aid of reverse engineering activities, the real world situation is compared withto already built solutions.  ... 
doi:10.1016/j.entcs.2005.07.003 fatcat:5ecquwhdo5grzbpresr6eznw5a

Introduction: Lessons Learned around the World: Key Success Factors to Enable Process Change

D. Dorenbos, A. Combelles
2004 IEEE Software  
The authors explain how to use models to predict the amount of time needed for a reverse-engineering effort and to provide a quality standard against which the effort can be measured.  ...  David Dorenbos is director of Software and System Engineering Research at Motorola Labs. Contact him at Motorola, 1303 E. Algonquin, Schaumburg, IL 60196; dave.dorenbos@ motorola.com.  ... 
doi:10.1109/ms.2004.19 fatcat:bbvc7lfxnnacfeb4wq44e5hcaq

ENTERPRISE INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE MODERN OBFUSCATION TECHNIQUE FOR MOBILE NETWORK OPERATORS

Oleh Polihenko, Roman Odarchenko, Sergiy Gnatyuk
2020 Międzynarodowy Zbiór Prac Naukowych "Współpraca Europejska  
This method allows providing software protection of the enterprises from reverse engineering.  ...  Moreover, the software is the intellectual property of the enterprises, which developed it. The software is the intellectual property of both large corporations and small companies.  ...  of the software code to the reverse engineering process.  ... 
doi:10.32070/ec.v3i47.89 fatcat:ddnwm64olbbhbmori5j4nxossq

MemPick: A tool for data structure detection

Istvan Haller, Asia Slowinska, Herbert Bos
2013 2013 20th Working Conference on Reverse Engineering (WCRE)  
The lack of information about the pointer network limits our ability to efficiently perform forensics and reverse engineering.  ...  We evaluated MemPick on a wide variety of popular libraries and real world applications with great success.  ...  In conclusion, we believe that MemPick will be powerful tool in the hands of reverse engineers.  ... 
doi:10.1109/wcre.2013.6671327 dblp:conf/wcre/HallerSB13a fatcat:uabqixi5gbdd7a24kg2arl4zym

University Of Jordan Case Tool (Uj-Case- Tool) For Database Reverse Engineering

Fawaz A. Masoud, Heba_tallah Khattab, Mahmoud Al-Karazoon
2007 Zenodo  
The database reverse engineering problems and solving processes are getting mature, even though, the academic community is facing the complex problem of knowledge transfer, both in university and industrial  ...  It presents an algorithm that describes the developed academic CASE tool which has been used for several years both as an illustration of the principles of database reverse engineering and as an exercise  ...  Database Reverse engineering (DBRE) is a software engineering process through which the analyst tries to understand and document the files and/or the database of an application.  ... 
doi:10.5281/zenodo.1076141 fatcat:blx4ffpbg5cnhktz32zpa2scjm

UNDERSTANDING SOFTWARE SYSTEMS USING REVERSE ENGINEERING TECHNOLOGY [chapter]

HAUSI A. MÜLLER, KENNY WONG, SCOTT R. TILLEY
1995 Object-Oriented Technology for Database and Software Systems  
The process of reverse engineering is introduced as an aid in program understanding.  ...  Presented is reverse engineering technology developed as part of the Rigi project.  ...  The study of existing, real-world software systems is often overlooked.  ... 
doi:10.1142/9789812831163_0016 fatcat:spiotvomffc7xffooyb7cieb5y

Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights

Carina Wiesen, Stefen Becker, Marc Fyrbiak, Nils Albartus, Malte Elson, Nikol Rummel, Christof Paar
2018 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)  
To the best of our knowledge, we have developed the first course to systematically teach students hardware reverse engineering based on insights from the fields of educational research, cognitive science  ...  a special focus on gate-level netlist reverse engineering and provide the required tools to support it; (3) we conduct an educational evaluation of our pilot course.  ...  Note that project 1 and 2 were important to introduce hardware reverse engineering in general and the educational software HAL in particular, but did not include real-world hardware reverse engineering  ... 
doi:10.1109/tale.2018.8615270 dblp:conf/tale/WiesenBFAERP18 fatcat:pxrj7t5rjbbsvmrcwxuyfko5nu

Intellectual property right protection in the software market

Yasuhiro Arai
2017 Economics of Innovation and New Technology  
We discuss the software patent should be granted or not. There exist two types of coping in the software market; reverse engineering and software duplication.  ...  Software patent can prevent both types of copies since a patent protects an idea. If the software is not protected by a patent, software producer cannot prevent reverse engineering.  ...  In the software market, there are two types of copying: reverse engineering and software duplication. Reverse engineering is copying by rival producers.  ... 
doi:10.1080/10438599.2017.1286734 fatcat:qoovujshsfcypox7wxedqjzhru

A Thorough Investigation on Software Protection Techniques against Various Attacks

Sasirekha N
2012 Bonfring International Journal of Software Engineering and Soft Computing  
There are various threats such as piracy, reverse engineering, tampering etc., exploits critical and poorly protected software.  ...  Software security and protection plays an important role in software engineering.  ...  Unauthorized reverse-engineering of algorithms is a major issue for the software industry. Reverse-engineers look for security holes in the program to make use of competitors' vital approaches.  ... 
doi:10.9756/bijsesc.10030 fatcat:u273xyqjxjeyvisfsajcanpfoe
« Previous Showing results 1 — 15 out of 116,363 results