Sciweavers

726 search results - page 81 / 146
» Reverse engineering: a roadmap
Sort
View
ENTCS
2007
87views more  ENTCS 2007»
13 years 10 months ago
Aspect-orientation For Revitalising Legacy Business Software
This paper relates on a first attempt to see if aspect-oriented programming (AOP) and logic meta-programming (LMP) can help with the revitalisation of legacy business software. B...
Kris De Schutter, Bram Adams
CCS
2007
ACM
14 years 4 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 5 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
SIGSOFT
2005
ACM
14 years 10 months ago
Surveying the factors that influence maintainability: research design
We want to explore and analyse design decisions that influence maintainability of software. Software maintainability is important because the effort expended on changes and fixes ...
Wiebe Hordijk, Roel Wieringa
EMSOFT
2006
Springer
14 years 1 months ago
Defining a strategy to introduce a software product line using existing embedded systems
Engine Control Systems (ECS) for automobiles have numerous variants for many manufactures and different markets. To improve development efficiency, exploiting ECS commonalities an...
Kentaro Yoshimura, Dharmalingam Ganesan, Dirk Muth...