Sciweavers

677 search results - page 12 / 136
» Reverse Engineering
Sort
View
WCRE
2010
IEEE
13 years 6 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
ICSM
1994
IEEE
14 years 5 days ago
Domain-Retargetable Reverse Engineering II: Personalized User Interfaces
The user interface is an integral part of any application. This is especially true for reverse engineering environments, since the understanding process depends both on the user&#...
Scott R. Tilley
ASWEC
2005
IEEE
14 years 1 months ago
A Comparison of Reverse Engineering Tools Based on Design Pattern Decomposition
The usefulness of design patterns in forward engineering is already well-known and several tools provide support for their application in the development of software systems. Whil...
Francesca Arcelli Fontana, Stefano Masiero, Claudi...
WCRE
2003
IEEE
14 years 1 months ago
Leveraging Visio for Adoption-Centric Reverse Engineering Tools
There are many reasons why reverse engineering research tools often fail to be evaluated or adopted in industry. Their rough user interfaces and poor interoperability are just two...
Qin Zhu, Yu Chen, Piotr Kaminski, Anke Weber, Holg...
WCRE
2006
IEEE
14 years 2 months ago
The Experimental Paradigm in Reverse Engineering: Role, Challenges, and Limitations
In many areas of software engineering, empirical studies are playing an increasingly important role. This stems from the fact that software technologies are often based on heurist...
Lionel C. Briand