Sciweavers

29 search results - page 4 / 6
» Towards automatic reverse engineering of software security c...
Sort
View
CSMR
2005
IEEE
14 years 3 months ago
Database Wrappers Development: Towards Automatic Generation
Wrapping databases allows them to be reused in formerly unplanned contexts, such as web-based applications or federated systems. Indeed, a wrapper can provide external clients of ...
Philippe Thiran, Jean-Luc Hainaut, Geert-Jan Hoube...
ICSE
2001
IEEE-ACM
14 years 2 months ago
Functional Paleontology: System Evolution as the User Sees It
It has long been accepted that requirements analysis should precede architectural design and implementation, but in software evolution and reverse engineering this concern with bl...
Annie I. Antón, Colin Potts
OOPSLA
2005
Springer
14 years 3 months ago
Using refactorings to automatically update component-based applications
Frameworks and libraries change their APIs during evolution. Migrating an application to the new API is tedious and disrupts the development process. Although some tools and techn...
Danny Dig
WCRE
2005
IEEE
14 years 3 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
AOSD
2005
ACM
14 years 3 months ago
Towards just-in-time middleware architectures
Middleware becomes increasingly important in building distributed applications. Conventional middleware systems are designed, implemented, and packaged before applications are dev...
Charles Zhang, Dapeng Gao, Hans-Arno Jacobsen