Sciweavers

677 search results - page 52 / 136
» Reverse Engineering Super-Repositories
Sort
View
WCRE
2007
IEEE
14 years 3 months ago
Recovering Data Models via Guarded Dependences
This paper presents an algorithm for reverse engineering semantically sound object-oriented data models from programs written in weakly-typed languages like Cobol. Our inference i...
Raghavan Komondoor, G. Ramalingam
WCRE
2005
IEEE
14 years 2 months ago
Symbolic Interpretation of Legacy Assembly Language
We apply static analysis and symbolic interpretation techniques to reverse engineer the semantics of legacy assembler code. We examine the case of IBM-1800 programs in detail. Fro...
Jacques Carette, Pulak Kumar Chowdhury
COMPSAC
2000
IEEE
14 years 1 months ago
Dependence Analysis of Java Bytecode
Understanding program dependencies in a computer program is essential for many software engineering tasks such as program understanding, testing, debugging, reverse engineering, a...
Jianjun Zhao
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 4 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
WISA
2005
Springer
14 years 2 months ago
Software Protection Through Dynamic Code Mutation
Abstract. Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in a...
Matias Madou, Bertrand Anckaert, Patrick Moseley, ...