Sciweavers

IUI
2004
ACM
14 years 3 months ago
Flexible re-engineering of web sites
Re-engineering transforms a final user interface into a logical representation that is manipulable enough to allow forward engineering to port a UI from one computing platform to ...
Laurent Bouillon, Jean Vanderdonckt, Kwok Chieu Ch...
WISA
2005
Springer
14 years 3 months ago
Software Protection Through Dynamic Code Mutation
Abstract. Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in a...
Matias Madou, Bertrand Anckaert, Patrick Moseley, ...
WCRE
2005
IEEE
14 years 3 months ago
Design Pattern Detection in Eiffel Systems
The use of design patterns in a software system can provide strong indications about the rationale behind the system’s design. As a result, automating the detection of design pa...
Wei Wang, Vassilios Tzerpos
WCRE
2005
IEEE
14 years 3 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
WCRE
2005
IEEE
14 years 3 months ago
Deobfuscation: Reverse Engineering Obfuscated Code
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Sharath K. Udupa, Saumya K. Debray, Matias Madou
WCRE
2005
IEEE
14 years 3 months ago
Diagnosing Design Problems in Object Oriented Systems
Software decay is a phenomenon that plagues aging software systems. While in recent years, there has been significant progress in the area of automatic detection of “code smells...
Adrian Trifu, Radu Marinescu
WCRE
2005
IEEE
14 years 3 months ago
Semantic Navigation of Large Code Bases in Higher-Order, Dynamically Typed Languages
— Chuck is a new code browser that allows navigation of a code base along semantic structures, such as data-flow and higher-order control-flow relationships. Employing the fast...
S. Alexander Spoon, Olin Shivers
WCRE
2005
IEEE
14 years 3 months ago
Enriching Reverse Engineering with Semantic Clustering
Understanding a software system by just analyzing the structure of the system reveals only half of the picture, since the structure tells us only how the code is working but not w...
Adrian Kuhn, Stéphane Ducasse, Tudor G&icir...
WCRE
2005
IEEE
14 years 3 months ago
Toward an Infrastructure to Support Interoperability in Reverse Engineering
In this paper we present an infrastructure that supports interoperability among various reverse engineering tools and applications. We include an Application Programmer’s Interf...
Nicholas A. Kraft, Brian A. Malloy, James F. Power
WCRE
2005
IEEE
14 years 3 months ago
When Functions Change Their Names: Automatic Detection of Origin Relationships
It is a common understanding that identifying the same entity such as module, file, and function between revisions is important for software evolution related analysis. Most softw...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.