Sciweavers

3792 search results - page 122 / 759
» Techniques for Trusted Software Engineering
Sort
View
200
Voted
WCRE
2010
IEEE
15 years 2 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
125
Voted
KBSE
2007
IEEE
15 years 10 months ago
Exploring the neighborhood with dora to expedite software maintenance
Completing software maintenance and evolution tasks for today’s large, complex software systems can be difficult, often requiring considerable time to understand the system well...
Emily Hill, Lori L. Pollock, K. Vijay-Shanker
132
Voted
APSEC
2005
IEEE
15 years 9 months ago
Ontology-based Active Requirements Engineering Framework
Software-intensive systems are systems of systems that rely on complex interdependencies among themselves as well as with their operational environment to satisfy the required beh...
Seok Won Lee, Robin A. Gandhi
109
Voted
SAC
2005
ACM
15 years 9 months ago
Where web engineering tool support ends: building usable websites
In this paper, two of the currently available Web Engineering solutions (UWE and OO-H) are analysed with regard to the question whether websites created with them and their tools ...
Richard Atterer
120
Voted
ASWEC
2000
IEEE
15 years 8 months ago
ReVis: Reverse Engineering by Clustering and Visual Object Classification
This paper presents the framework of a scale-oriented scheme for the presentation and classification of reverse engineered sections of procedural code into objects. The aim is to ...
Aaron J. Quigley, Margot Postema, Heinz W. Schmidt