Sciweavers

WCRE
2000
IEEE
14 years 3 months ago
Reverse Engineering Tools as Media for Imperfect Knowledge
Reverse engineering is an imperfect process driven by imperfect knowledge. Most current reverse engineering tools do not adequately consider these inherent characteristics. They f...
Jens H. Jahnke, Andrew Walenstein
WCRE
2003
IEEE
14 years 4 months ago
Fuzzy Extensions for Reverse Engineering Repository Models
Reverse Engineering is a process fraught with imperfections. The importance of dealing with non-precise, possibly inconsistent data explicitly when interacting with the reverse en...
Ulrike Kölsch, René Witte
CSMR
2003
IEEE
14 years 4 months ago
Transparent Reverse Engineering Tool Integration Using a Conceptual Transaction Adapter
In this paper we present a proposal for a novel approach to facilitating transparent interoperability among reverse engineering tools. We characterize the architectural and operat...
Dean Jin, James R. Cordy, Thomas R. Dean
WCRE
2005
IEEE
14 years 4 months ago
Toward an Infrastructure to Support Interoperability in Reverse Engineering
In this paper we present an infrastructure that supports interoperability among various reverse engineering tools and applications. We include an Application Programmer’s Interf...
Nicholas A. Kraft, Brian A. Malloy, James F. Power
DRM
2007
Springer
14 years 5 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
IEEEIAS
2007
IEEE
14 years 5 months ago
Metrics-based Evaluation of Slicing Obfuscations
An obfuscation aims to transform a program, without affecting its functionality, so that some secret data within the program can be hidden for as long as possible from an adversar...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
ACISICIS
2007
IEEE
14 years 5 months ago
Slicing Aided Design of Obfuscating Transforms
Abstract—An obfuscation aims to transform a program, without affecting its functionality, so that some secret information within the program can be hidden for as long as possible...
Stephen Drape, Anirban Majumdar, Clark D. Thombors...
ICSE
2007
IEEE-ACM
14 years 11 months ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova