Several reverse engineering methods for recovering objects from legacy systems have been proposed in the literature, but most of them neglect to identify the relationships among t...
Giuseppe A. Di Lucca, Anna Rita Fasolino, Ugo de C...
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...
In this paper, we discuss how users and designers of existing learning management systems (LMSs) can make use of policies to enhance adaptivity and adaptability. Many widespread L...
Arne Wolf Koesling, Eelco Herder, Juri Luca De Coi...
Aspect-based refactoring, called aspectualization, involves moving program code that implements cross-cutting concerns into aspects. Such refactoring can improve the maintainabili...
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...