Sciweavers

677 search results - page 30 / 136
» Domain-Retargetable Reverse Engineering
Sort
View
NDSS
2008
IEEE
14 years 2 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
ACMSE
2006
ACM
14 years 2 months ago
Some new approaches for preventing software tampering
In this paper, we propose several methods to increase the difficulty of reverse engineering applications, with special emphasis on preventing the circumvention of copy protection ...
Bin Fu, Golden G. Richard III, Yixin Chen
SIGSOFT
2008
ACM
14 years 9 months ago
Deriving input syntactic structure from execution
Program input syntactic structure is essential for a wide range of applications such as test case generation, software debugging and network security. However, such important info...
Zhiqiang Lin, Xiangyu Zhang
SIGSOFT
2010
ACM
13 years 6 months ago
Using dynamic analysis to create trace-focused user interfaces for IDEs
This research demonstration presents the tool, Dynamic Interactive Views for Reverse Engineering (Diver). Diver supports software understanding through a trace focused user interf...
Del Myers, Margaret-Anne D. Storey
ICSE
2005
IEEE-ACM
14 years 8 months ago
Some myths of software engineering education
Based on many years of teaching software engineering, I present a number of lessons I have learned over the years. I do so in the form of a series of myths, the reverse of which c...
Hans van Vliet