Sciweavers

677 search results - page 70 / 136
» Reverse Engineering
Sort
View
CCS
2007
ACM
14 years 2 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 3 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
ICSE
2005
IEEE-ACM
14 years 8 months ago
Binary refactoring: improving code behind the scenes
We present Binary Refactoring: a software engineering technique for improving the implementation of programs without modifying their source code. While related to regular refactor...
Eli Tilevich, Yannis Smaragdakis
SIGSOFT
2010
ACM
13 years 5 months ago
Software is data too
Software systems are designed and engineered to process data. However, software is data too. The size and variety of today's software artifacts and the multitude of stakehold...
Andrian Marcus, Tim Menzies
SIGSOFT
2005
ACM
14 years 8 months ago
Surveying the factors that influence maintainability: research design
We want to explore and analyse design decisions that influence maintainability of software. Software maintainability is important because the effort expended on changes and fixes ...
Wiebe Hordijk, Roel Wieringa