A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is application/pdf
.
Filters
The small world of software reverse engineering
11th Working Conference on Reverse Engineering
Research in maintenance and reengineering has flourished and evolved into a central part of software engineering research worldwide. ...
In this paper, we have a look at this research community through the publications of its members in several international conferences. ...
The authors would like to acknowledge the suggestions by several of the WCRE atten-dees who stopped by our demo on the last day. ...
doi:10.1109/wcre.2004.37
dblp:conf/wcre/HassanH04
fatcat:cb4tk4uyvff6fpjhvdccbxklri
Why teach reverse engineering?
2005
Software engineering notes
Software reverse engineering is a fascinating discipline of software engineering. But it has failed to attract attention from students. ...
I will start with a brief overview of reverse engineering concepts, and then discuss advantages of teaching reverse engineering. ...
As reverse engineering encourages thinking 'out of the box'. Software piracy and illegal reversing of the disassembly has been a major concern for the software manufacturers. ...
doi:10.1145/1082983.1083004
fatcat:z7ifldjiz5hi7hhgfiav5xmtf4
Reverse Engineering in Product Manufacturing: An Overview
[chapter]
2013
DAAAM International Scientific Book 2013
Reverse engineering plays vital role in the branch of the mechanical design and manufacturing based industry. ...
In reverse engineering approach the important steps involved, are characterizations of geometric models and related surface representations, segmentation and surface fitting of simple and free-form shapes ...
Software Industry Software reverse engineering is concerned with the analysis of an existing system The IEEE Standard for Software Maintenance (IEEE Std 1219-1993) defines reverse engineering as "the process ...
doi:10.2507/daaam.scibook.2013.39
fatcat:zsvquabj35aubhqukivz5bff24
Reverse engineering is reverse forward engineering
2000
Science of Computer Programming
As an example, a small fragment of a real-time operating system is reverse-engineered using this approach. ...
A byproduct of the transformational reverse engineering process is a design database for the program that then can be maintained to minimize the need for further reverse engineering during the remaining ...
Such a system, called the Design Maintenance System (DMS), which is intended for handling commercial size software, is currently under development at Semantic Designs. ...
doi:10.1016/s0167-6423(99)00034-9
fatcat:raewl56pbnd7rfgdfnqqwv3z3q
Interactive Exploration of UML Sequence Diagrams
2005
3rd IEEE International Workshop on Visualizing Software for Understanding and Analysis
These techniques allow a programmer to explore interactively various aspects of large real-world sequence diagrams in order to gain insights about the behavior of the underlying software. ...
Reverse-engineered sequence diagrams, which are constructed from existing code, are becoming widely available to more programmers through modern commercial and research UML tools. ...
Reverse-engineered sequence diagrams also provide essential insights for software understanding and maintenance of large-scale software systems. ...
doi:10.1109/vissof.2005.1684295
dblp:conf/vissoft/SharpR05
fatcat:3gd77yhp3ngppiidzua5zwrhza
The Metric Lens: Visualizing Metrics and Structure on Software Diagrams
2008
2008 15th Working Conference on Reverse Engineering
We illustrate our technique and tool by a sample complexity assessment analysis of a real-world C++ software system. ...
We present the metric lens, a new visualization of methodlevel code metrics atop UML class diagrams, which allows performing metric-metric and metric-structure correlations on large diagrams. ...
Section 3 shows a case study of our technique in understanding a real-world software system. Section 4 discusses the results and future work directions. ...
doi:10.1109/wcre.2008.26
dblp:conf/wcre/ByelasT08
fatcat:tpf2tlrim5gyfd22uvwtfh73te
On the Role of Metadata in Visual Language Reuse and Reverse Engineering – An Industrial Case
2005
Electronical Notes in Theoretical Computer Science
Collecting metadata on a family of programs is useful not only for generating statistical data on the programs but also for future re-engineering and reuse purposes. ...
Metadata stored in a database is used to provide advanced program analysis support; from the large amount of programs, the metadata allows focusing the analysis to certain kinds of programs. ...
With aid of reverse engineering activities, the real world situation is compared withto already built solutions. ...
doi:10.1016/j.entcs.2005.07.003
fatcat:5ecquwhdo5grzbpresr6eznw5a
Introduction: Lessons Learned around the World: Key Success Factors to Enable Process Change
2004
IEEE Software
The authors explain how to use models to predict the amount of time needed for a reverse-engineering effort and to provide a quality standard against which the effort can be measured. ...
David Dorenbos is director of Software and System Engineering Research at Motorola Labs. Contact him at Motorola, 1303 E. Algonquin, Schaumburg, IL 60196; dave.dorenbos@ motorola.com. ...
doi:10.1109/ms.2004.19
fatcat:bbvc7lfxnnacfeb4wq44e5hcaq
ENTERPRISE INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE MODERN OBFUSCATION TECHNIQUE FOR MOBILE NETWORK OPERATORS
2020
Międzynarodowy Zbiór Prac Naukowych "Współpraca Europejska
This method allows providing software protection of the enterprises from reverse engineering. ...
Moreover, the software is the intellectual property of the enterprises, which developed it. The software is the intellectual property of both large corporations and small companies. ...
of the software code to the reverse engineering process. ...
doi:10.32070/ec.v3i47.89
fatcat:ddnwm64olbbhbmori5j4nxossq
MemPick: A tool for data structure detection
2013
2013 20th Working Conference on Reverse Engineering (WCRE)
The lack of information about the pointer network limits our ability to efficiently perform forensics and reverse engineering. ...
We evaluated MemPick on a wide variety of popular libraries and real world applications with great success. ...
In conclusion, we believe that MemPick will be powerful tool in the hands of reverse engineers. ...
doi:10.1109/wcre.2013.6671327
dblp:conf/wcre/HallerSB13a
fatcat:uabqixi5gbdd7a24kg2arl4zym
University Of Jordan Case Tool (Uj-Case- Tool) For Database Reverse Engineering
2007
Zenodo
The database reverse engineering problems and solving processes are getting mature, even though, the academic community is facing the complex problem of knowledge transfer, both in university and industrial ...
It presents an algorithm that describes the developed academic CASE tool which has been used for several years both as an illustration of the principles of database reverse engineering and as an exercise ...
Database Reverse engineering (DBRE) is a software engineering process through which the analyst tries to understand and document the files and/or the database of an application. ...
doi:10.5281/zenodo.1076141
fatcat:blx4ffpbg5cnhktz32zpa2scjm
UNDERSTANDING SOFTWARE SYSTEMS USING REVERSE ENGINEERING TECHNOLOGY
[chapter]
1995
Object-Oriented Technology for Database and Software Systems
The process of reverse engineering is introduced as an aid in program understanding. ...
Presented is reverse engineering technology developed as part of the Rigi project. ...
The study of existing, real-world software systems is often overlooked. ...
doi:10.1142/9789812831163_0016
fatcat:spiotvomffc7xffooyb7cieb5y
Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights
2018
2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)
To the best of our knowledge, we have developed the first course to systematically teach students hardware reverse engineering based on insights from the fields of educational research, cognitive science ...
a special focus on gate-level netlist reverse engineering and provide the required tools to support it; (3) we conduct an educational evaluation of our pilot course. ...
Note that project 1 and 2 were important to introduce hardware reverse engineering in general and the educational software HAL in particular, but did not include real-world hardware reverse engineering ...
doi:10.1109/tale.2018.8615270
dblp:conf/tale/WiesenBFAERP18
fatcat:pxrj7t5rjbbsvmrcwxuyfko5nu
Intellectual property right protection in the software market
2017
Economics of Innovation and New Technology
We discuss the software patent should be granted or not. There exist two types of coping in the software market; reverse engineering and software duplication. ...
Software patent can prevent both types of copies since a patent protects an idea. If the software is not protected by a patent, software producer cannot prevent reverse engineering. ...
In the software market, there are two types of copying: reverse engineering and software duplication. Reverse engineering is copying by rival producers. ...
doi:10.1080/10438599.2017.1286734
fatcat:qoovujshsfcypox7wxedqjzhru
A Thorough Investigation on Software Protection Techniques against Various Attacks
2012
Bonfring International Journal of Software Engineering and Soft Computing
There are various threats such as piracy, reverse engineering, tampering etc., exploits critical and poorly protected software. ...
Software security and protection plays an important role in software engineering. ...
Unauthorized reverse-engineering of algorithms is a major issue for the software industry. Reverse-engineers look for security holes in the program to make use of competitors' vital approaches. ...
doi:10.9756/bijsesc.10030
fatcat:u273xyqjxjeyvisfsajcanpfoe
« Previous
Showing results 1 — 15 out of 116,363 results