Sciweavers

677 search results - page 36 / 136
» Reverse Engineering Super-Repositories
Sort
View
IWPC
2003
IEEE
14 years 2 months ago
Handling Large Search Space in Pattern-Based Reverse Engineering
Large industrial legacy systems are challenges of reverseengineering activities. Reverse-engineering approaches use text-search tools based on regular expressions or work on prese...
Jörg Niere, Jörg P. Wadsack, Lothar Wend...
CHES
2009
Springer
248views Cryptology» more  CHES 2009»
14 years 9 months ago
The State-of-the-Art in IC Reverse Engineering
? This paper gives an overview of the place of reverse engineering (RE) in the semiconductor industry, and the techniques used to obtain information from semiconductor products. Th...
Randy Torrance, Dick James
CHI
2010
ACM
14 years 3 months ago
Prefab: implementing advanced behaviors using pixel-based reverse engineering of interface structure
Current chasms between applications implemented with different user interface toolkits make it difficult to implement and explore potentially important interaction techniques in n...
Morgan Dixon, James Fogarty
NDSS
2008
IEEE
14 years 3 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...
WCRE
2008
IEEE
14 years 3 months ago
Data Model Reverse Engineering in Migrating a Legacy System to Java
Central to any legacy migration project is the translation of the data model. Decisions made here will have strong implications to the rest of the translation. Some legacy languag...
Mariano Ceccato, Thomas Roy Dean, Paolo Tonella, D...