By Topic

Proceedings of 2nd Working Conference on Reverse Engineering

14-16 July 1995

Filter Results

Displaying Results 1 - 25 of 36
  • Proceedings of 2nd Working Conference on Reverse Engineering

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • The interleaving problem in program understanding

    Publication Year: 1995, Page(s):166 - 175
    Cited by:  Papers (24)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1021 KB)

    One of the factors that can make a program difficult to understand is that code responsible for accomplishing more than one purpose may be woven together in a single section. We call this interleaving, and it may arise either intentionally-for example, in optimizing a program, a programmer may use some intermediate result for several purposes-or unintentionally, due to patches, quick fixes, or oth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Qualifying reusable functions using symbolic execution

    Publication Year: 1995, Page(s):178 - 187
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1127 KB)

    We present an approach to reverse engineering source code modules to abstract their interface and functional specifications. A fine-grained program representation for C programs, the Combined C Graph (CGG), is used to perform dynamic analysis of a module by means of symbolic execution techniques. We focus on problems like pointer variables and expressions containing embedded side-effects and contr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Index of Authors

    Publication Year: 1995
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (67 KB)

    Presents an index of the authors whose papers are published in the conference. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • August-II: a tool for step-by-step data model reverse engineering

    Publication Year: 1995, Page(s):146 - 154
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (772 KB)

    August-II is a data reverse engineering tool whose input can be from a variety of sources from COBOL record layouts to DB/2 data definitions. The translation that is done is designed to produce a conceptual data model to that allows the user to understand the current environment and to move to new data technology. August-II produces output that can be used as input to many different software packa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-based design of tools for business understanding and re-engineering

    Publication Year: 1995, Page(s):324 - 333
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (900 KB)

    Tools can provide useful assistance for business re-engineering planning. Activities such as business knowledge acquisition, business process modeling, performance, quality and impact analysis can all be done more effectively if supported by proper tools. In this paper, we describe a design scenario for business understanding and re-engineering tools that is based on the systematic modeling of bus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements for information system reverse engineering support

    Publication Year: 1995, Page(s):136 - 145
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1068 KB)

    This paper proposes a general architecture for information systems (or data-centered applications) reverse engineering CASE environments. Recovering the specifications of such applications requires recovering first those of their data, i.e. database reverse engineering (DBRE). First, the paper describes a generic DMS-independent DBRE methodology, then it analyses the main characteristics of DBRE a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program understanding as constraint satisfaction

    Publication Year: 1995, Page(s):314 - 323
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    The process of understanding a source code in a high-level programming language involves complex computation. Given a piece of legacy code and a library of program plan templates, understanding the code corresponds to building mappings from parts of the source code to particular program plans. These mappings could be used to assist an expert in reverse engineering legacy code, to facilitate softwa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal representation of reuseable software modules

    Publication Year: 1995, Page(s):198 - 205
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    Recovering design information from software is an active research area in reverse engineering. If the extracted information is represented formally, we are able to process the information at the semantic level for analysis and reasoning. We describe a formal approach to representing modules. A module encapsulates a collection of dependent components. The main feature of the formalism is characteri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Legacy System Cataloging Facility

    Publication Year: 1995, Page(s):52 - 60
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (880 KB)

    Describes a software model construction and management tool that provides a foundation for legacy systems modeling, analysis and transformation on an enterprise scale. The Legacy System Cataloging Facility provides a scalable, multi-tiered hierarchical storage mechanism for managing legacy system as persistent, high-fidelity software models within a distributed-computing framework. The Legacy Syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deriving a logical data model for a system using the RECAST method

    Publication Year: 1995, Page(s):126 - 135
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB)

    The Reverse Engineering into CASE Technology method (RECAST) takes the source code for an existing COBOL system and derives a no-loss representation of the system documented in the format of Structured Systems Analysis and Design Method (SSADM) documentation. One key element of the method is the abstraction of the system data and its representation as a logical data model. The RECAST method consid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering as a bridge to CASE

    Publication Year: 1995, Page(s):300 - 313
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    This is an applied research report on the exploitation of reverse engineering technology acquired through the ESPRIT DOCKET Project. It describes three efforts to implement this technology in business applications at the Bremer Warehouse Company, the Technical University of Manchester and the Union Bank of Switzerland. In all three instances, reverse engineering was used to extract knowledge from ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strongest postcondition semantics as the formal basis for reverse engineering

    Publication Year: 1995, Page(s):188 - 197
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    Reverse engineering of program code is the process of constructing a higher level abstraction of an implementation in order to facilitate the understanding of a system that may be in a “legacy” or “geriatric” state. Changing architectures and improvements in programming methods, including formal methods in software development and object-oriented programming, have prompted ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RESCUE: legacy systems translator

    Publication Year: 1995, Page(s):39 - 50
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1024 KB)

    Shows theoretical and practical results of a research project developed by ArtInSoft SA. First, it shows the theoretical basis required to automatically translate computer programs by means of deduction. As it is implemented in the Logistica language, deduction is performed by an expression rewriting process which preserves equivalence in each deduction step, therefore guaranteeing translation cor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Observed idiosyncracies of relational database designs

    Publication Year: 1995, Page(s):116 - 125
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    Several processes have been advanced in the literature for reverse engineering of relational databases. The inputs to these processes are relational tables and available contextual information. The output is a model of the underlying logical intent, apart from the implementation artifacts. Most of the existing processes for database reverse engineering are inadequate; they assume too high a qualit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern matching for design concept localization

    Publication Year: 1995, Page(s):96 - 103
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    The effective synergy of a number of different techniques is the key to the successful development of an efficient reverse engineering environment. Compiler technology, pattern matching techniques, visualization tools, and software repositories play an important role for the identification of procedural, data, and abstract-data-type related concepts in the source code. This paper describes a numbe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating user interfaces from specifications produced by a reverse engineering process

    Publication Year: 1995, Page(s):292 - 298
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    A framework for automatic graphical user interface code generation is developed. Tools to support this framework are built: (1) a parser, (2) generation rules, and (3) target code production. The parser reads specifications resulted from a reverse engineering process of a character-oriented user interface. These specifications are written in a language called AUIDL (Abstract User Interface Descrip... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recovering abstract data types and object instances from a conventional procedural language

    Publication Year: 1995, Page(s):227 - 236
    Cited by:  Papers (38)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    As part of our investigations on recovering software architectural representations from source code, we have developed, implemented and tested an interactive approach to the recovery of implicit abstract data types (ADTs) and object instances from conventional procedural languages such as C. This approach includes automatic recognition and semi-automatic techniques that handle potential recognitio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating reengineering, reuse and specification tool environments to enable reverse engineering

    Publication Year: 1995, Page(s):78 - 84
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    Describes ongoing work to integrate three tool environments and then discusses some of the implications of this work. Considering the number of legacy systems which must be migrated to new software and hardware disciplines, it is necessary to target existing and developing tools to aid in this migration process. Utilizing these existing tools and their repositories, while developing new tools, wil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution is essential for software tool development

    Publication Year: 1995, Page(s):272 - 281
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1064 KB)

    We examine the problems encountered in evolving software development tools, in particular, configuration management tools, drawing on our experience in producing the DaSC configuration management toolset. Building good software development tools is a time-consuming, iterative process where the tool designers must take into account the evolving nature of the software development process embodied in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reengineering procedural into data flow programs

    Publication Year: 1995, Page(s):32 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    Program transformation techniques are described for automatic translation of systems from a procedural form into a non-procedural, event-driven, data-flow computational architecture called the quasi-procedural method (QPM). Significant performance optimizations are achieved for many kinds of computations after conversion of their programs into QPM. The translation into QPM is accomplished with a k... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DECODE: a cooperative environment for reverse-engineering legacy software

    Publication Year: 1995, Page(s):156 - 165
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1052 KB)

    While automated program understanders have had some success in partially extracting design information from source code, they are unlikely to be able to completely understand existing real-world legacy systems. To address this problem, we have been developing DECODE, an environment in which programmer and system cooperate to extract object-oriented designs from legacy systems. DECODE consists of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding objects in procedural programs: an alternative approach

    Publication Year: 1995, Page(s):208 - 216
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    Effective software maintenance requires a detailed knowledge of the system's artifacts, the way these artifacts are used or modified and their interrelationships. Based on some useful characteristics of the object-oriented paradigm the identification of objects within procedural programs has become a promising approach to reduce the effort in program understanding and, hence, the maintenance cost.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a generic reverse engineering assistant tool

    Publication Year: 1995, Page(s):61 - 70
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (912 KB)

    Reverse engineering is a knowledge-intensive process. We believe the involvement of a domain expert is critical in any but a trivial reverse engineering task. Our approach to reverse engineering assumes close cooperation between a domain expert and a knowledge-based reverse engineering assistant tool. Reverse engineering progresses in steps. At each step, a tool applies heuristic rules to extract ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing empirical data from a reverse engineering project

    Publication Year: 1995, Page(s):106 - 114
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    This study reports the analysis of data collected during the execution of a reverse engineering process in a real environment. Essentially, the analysis assessed productivity aspects. The experience showed the need for automatic tools which can be adapted to the context the process is performed in and the possibility of anchoring the effort required for the reverse engineering to the desired produ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.