By Topic

12th Working Conference on Reverse Engineering (WCRE'05)

7-11 Nov. 2005

Filter Results

Displaying Results 1 - 25 of 36
  • WCRE 2005. 12th Working Conference on Reverse Engineering

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • 12th Working Conference on Reverse Engineering - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • 12th Working Conference on Reverse Engineering - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • 12th Working Conference on Reverse Engineering - Table of contents

    Publication Year: 2005, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2005, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (33 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the General Chair: On the Meeting of Software Architecture and Reverse Engineering

    Publication Year: 2005, Page(s):ix - xii
    Request permission for commercial reuse | PDF file iconPDF (116 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2005, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2005, Page(s):xv - xvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (41 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Search-based amorphous slicing

    Publication Year: 2005, Page(s):10 pp. - 12
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    Amorphous slicing is an automated source code extraction technique with applications in many areas of software engineering, including comprehension, reuse, testing and reverse engineering. Algorithms for syntax-preserving slicing are well established, but amorphous slicing is harder because it requires arbitrary transformation; finding good general purpose amorphous slicing algorithms therefore re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Re-engineering C++ component models via automatic program transformation

    Publication Year: 2005
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Automated program transformation holds promise for a variety of software life cycle endeavors, particularly where the size of legacy systems makes code analysis, re-engineering, and evolution difficult and expensive. But constructing highly scalable transformation tools supporting modern languages in full generality is itself a painstaking and expensive process. This cost can be managed by develop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbolic interpretation of legacy assembly language

    Publication Year: 2005
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    We apply static analysis and symbolic interpretation techniques to reverse engineer the semantics of legacy assembler code. We examine the case of IBM-1800 programs in detail. From the documented operational semantics of the IBM-1800, we simultaneously obtain an emulator and a symbolic analysis program. Augmented with some control flow information, we can use the symbolic analysis to provide both ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing security using legality assertions

    Publication Year: 2005
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited to protecting the return address on the stack; others are more general, but have undesirable properties such as large overhead and false warnings. The approach described in this paper uses legality assertions, source code ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deobfuscation: reverse engineering obfuscated code

    Publication Year: 2005
    Cited by:  Papers (33)  |  Patents (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner workings of proprietary software systems. This paper examines techniques for automatic deobfuscation of obfuscated programs, as a step towards reverse engineering such programs. Our results indicate that much of the effects of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture recovery and abstraction from the perspective of processes

    Publication Year: 2005
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    For the increasing complexity of software systems, the main work of software development, maintenance and evolution has been focused on the comprehension of the existing systems. In order to help users comprehend at all aspects and levels of a target system, it is necessary to reversely recover and abstract its high-level architecture, which can reflect the framework and holistic behavioral featur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Source versus object code extraction for recovering software architecture

    Publication Year: 2005
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    The architecture of many large software systems is rarely documented and if documented it is usually out of date. To support developers maintaining and evolving these systems, an up to date view of the architecture could be recovered from the system's implementation. Source code or object code extractors may be used to recover the architecture. In this paper, we explore using two types of extracto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple layer clustering of large software systems

    Publication Year: 2005
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Software clustering algorithms presented in the literature rarely incorporate in the clustering process dynamic information, such as the number of function invocations during runtime. Moreover, the structure of a software system is often multi-layered, while existing clustering algorithms often create flat system decompositions. This paper presents a software clustering algorithm called MULICsoft ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Equipping the reflexion method with automated clustering

    Publication Year: 2005, Page(s):10 pp. - 98
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    A significant aspect in applying the reflexion method is the mapping of components found in the source code onto the conceptual components defined in the hypothesized architecture. To date, this mapping is established manually, which requires a lot of work for large software systems. In this paper, we present a new approach, in which clustering techniques are applied to support the user in the map... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capturing nontrivial concerns in object-oriented software

    Publication Year: 2005
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB) | HTML iconHTML

    Code that is scattered and tangled as a result of orthogonal concerns seriously hinders software maintenance and reuse. As OO decompositions are unable to cleanly encapsulate such orthogonal (cross-cutting) concerns simultaneously, new ideas and languages were devised to capture and encapsulate them. In this paper, we argue that the current leading approaches (AOP as it is understood in AspectJ an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimating the costs of a reengineering project

    Publication Year: 2005, Page(s):9 pp. - 119
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    Accurate estimation of project costs is an essential prerequisite to making a reengineering project. Existing systems are usually reengineered because it is cheaper to reengineer them than to redevelop or to replace them. However, to make this decision, management must know what the reengineering will cost. This contribution describes an eight step tool supported process for calculating the time a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asset recovery and their incorporation into product lines

    Publication Year: 2005
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Software product lines aim in having a common platform from which several similar products can be derived. The elements of the platform are called assets and they are managed in an asset base being part of the product line infrastructure. Assets can include own developments, open source or third-party software modules, as well as design and project documents. In the context of the European-wide pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enriching reverse engineering with semantic clustering

    Publication Year: 2005
    Cited by:  Papers (37)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    Understanding a software system by just analyzing the structure of the system reveals only half of the picture, since the structure tells us only how the code is working but not what the code is about. What the code is about can be found in the semantics of the source code: names of identifiers, comments etc. In this paper, we analyze how these terms are spread over the source artifacts using late... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When functions change their names: automatic detection of origin relationships

    Publication Year: 2005, Page(s):10 pp. - 152
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    It is a common understanding that identifying the same entity such as module, file, and function between revisions is important for software evolution related analysis. Most software evolution researchers use entity names, such as file names and function names, as entity identifiers based on the assumption that each entity is uniquely identifiable by its name. Unfortunately names change over time.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Diagnosing design problems in object oriented systems

    Publication Year: 2005
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Software decay is a phenomenon that plagues aging software systems. While in recent years, there has been significant progress in the area of automatic detection of "code smells" on one hand, and code refactorings on the other hand, we claim that existing restructuring practices are seriously hampered by their symptomatic and informal (non-repeatable) nature. This paper makes a clear distinction b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design pattern detection in Eiffel systems

    Publication Year: 2005
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    The use of design patterns in a software system can provide strong indications about the rationale behind the system's design. As a result, automating the detection of design pattern instances could be of significant help to the process of reverse engineering large software systems. In this paper, we introduce DPVK (Design Pattern Verification toolKit), the first reverse engineering tool to detect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mappings for accurately reverse engineering UML class models from C++

    Publication Year: 2005, Page(s):10 pp. - 184
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    The paper introduces a number of mapping rules for reverse engineering UML class models from C++ source code. The mappings focus on accurately identifying such elements as relationship types, multiplicities, and aggregation semantics. These mappings are based on domain knowledge of the C++ language and common programming conventions and idioms. An application implementing these heuristics is used ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.