By Topic

Reverse Engineering, 2006. WCRE '06. 13th Working Conference on

Date 23-27 Oct. 2006

Filter Results

Displaying Results 1 - 25 of 56
  • 13th Working Conference on Reverse Engineering-Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • 13th Working Conference on Reverse Engineering-Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • 13th Working Conference on Reverse Engineering-Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • 13th Working Conference on Reverse Engineering-TOC

    Publication Year: 2006, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2006, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (44 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Co-Chairs

    Publication Year: 2006, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (56 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2006, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2006, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • The Experimental Paradigm in Reverse Engineering: Role, Challenges, and Limitations

    Publication Year: 2006, Page(s):3 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    In many areas of software engineering, empirical studies are playing an increasingly important role. This stems from the fact that software technologies are often based on heuristics and are moreover expected to be used in processes where human intervention is paramount. As a result, not only it is important to assess their cost-effectiveness under conditions that are as realistic and representati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bits of History, Challenges for the Future and Autonomic Computing Technology

    Publication Year: 2006, Page(s):9 - 18
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Over the past fifteen years, the software reverse engineering community has produced many software engineering methods, tools, and techniques that have had significant impact in the software industry. After a research area has evolved for 10-20 years, it can easily fade away due to narrow focus, overgrazing, or lack of impact. Trying to assess the impact of various approaches and results in a rese... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Cloning Considered Harmful" Considered Harmful

    Publication Year: 2006, Page(s):19 - 28
    Cited by:  Papers (54)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (118 KB) | HTML iconHTML

    Current literature on the topic of duplicated (cloned) code in software systems often considers duplication harmful to the system quality and the reasons commonly cited for duplicating code often have a negative connotation. While these positions are sometimes correct, during our case studies we have found that this is not universally true, and we have found several situations where code duplicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A common framework for aspect mining based on crosscutting concern sorts

    Publication Year: 2006, Page(s):29 - 38
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    The increasing number of aspect mining techniques proposed in literature calls for a methodological way of comparing and combining them in order to assess, and improve on, their quality. This paper addresses this situation by proposing a common framework based on crosscutting concern sorts which allows for consistent assessment, comparison and combination of aspect mining techniques. The framework... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding Software Architectures by Visualization--An Experiment with Graphical Elements

    Publication Year: 2006, Page(s):39 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    The evolution and maintenance of large-scale software systems requires first an understanding of its architecture before delving into lower level details. Tools facilitating the architecture comprehension tasks by visualization provide different sets of graphical elements. We conducted a controlled experiment that exemplifies the critical role of such graphical elements when aiming at understandin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QUARK: Empirical Assessment of Automaton-based Specification Miners

    Publication Year: 2006, Page(s):51 - 60
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    Software is often built without specification. Tools to automatically extract specification from software are needed and many techniques have been proposed. One type of these specifications - temporal API specification - is often specified in the form of automaton. There has been much work on reverse engineering or mining software temporal specification, using dynamic analysis techniques; i.e., an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Orchestrated Multi-view Software Architecture Reconstruction Environment

    Publication Year: 2006, Page(s):61 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    Most approaches in reverse engineering literature generate a single view of a software system that restricts the scope of the reconstruction process. We propose an orchestrated set of techniques and a multi-view toolkit to reconstruct three views of a software system such as design, behavior, and structure. Scenarios are central in generating design and behavior views. The design view is reconstru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Industrial Case Study of Program Artifacts Viewed During Maintenance Tasks

    Publication Year: 2006, Page(s):71 - 82
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (761 KB) | HTML iconHTML

    Research on maintenance task structure modeling has so far examined only how often program artifacts are modified, and what information can be deduced from modification records. However, developers often access artifacts that they do not change, and this information is not modeled or recorded by current research systems. In this paper, we describe an exploratory industrial case study that we have ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Programs Represent Reality (and how they don't)

    Publication Year: 2006, Page(s):83 - 92
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Programming is modeling the reality. Most of the times, the mapping between source code and the real world concepts are captured implicitly in the names of identifiers. Making these mappings explicit enables us to regard programs from a conceptual perspective and thereby to detect semantic defects such as (logical) redundancies in the implementation of concepts and improper naming of program entit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Computing the Canonical Features of Software Systems

    Publication Year: 2006, Page(s):93 - 102
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    Software applications typically have many features that vary in their similarity. We define a measurement of similarity between pairs of features based on their underlying implementations and use this measurement to compute a set of canonical features. The canonical features set (CFS) consists of a small number of features that are as dissimilar as possible to each other, yet are most representati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Study of Executable Concept Slice Size

    Publication Year: 2006, Page(s):103 - 114
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2137 KB) | HTML iconHTML

    An executable concept slice extracts from a program an executable subprogram that captures the semantics of a specified high-level concept from the program. Executable concept slicing combines the executability of program slicing, with the expressive domain level criteria of concept assignment. This paper presents results from an investigation of executable concept slice size to assess the effecti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Service-Oriented Componentization Framework for Java Software Systems

    Publication Year: 2006, Page(s):115 - 124
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (521 KB) | HTML iconHTML

    In the fast growing global market for services, service-oriented computing has drastically changed the way in which we develop software systems. Providing competitive services to these markets will be critical to the success of businesses and organizations. Some competitive services have already been implemented in existing systems. In this paper, we present a novel service-oriented componentizati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse Engineering of System Interfaces A Report from the Field

    Publication Year: 2006, Page(s):125 - 133
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    This paper is a report on three real industrial projects conducted to redocument the system interfaces of existing application systems - trading system, a health insurance system and a bank credit system. The first reverse engineering project was for the purpose of accessing the backend C server software from Web clients. The second project was for the purpose of testing the interfaces between COB... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A UML-based Approach for Abstracting Application Interfaces to REST-like Services

    Publication Year: 2006, Page(s):134 - 146
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1021 KB) | HTML iconHTML

    The REST (representational state transfer) architectural style defines a set of interface constraints that aim at retaining interoperability between systems that may evolve independently of each other. However, REST developers are currently lacking modeling tools that would help them apply interface constraints to legacy APIs when exposing them as REST-like services. We believe that REST-aware too... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP

    Publication Year: 2006, Page(s):147 - 156
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    In general, SQL-injection attacks rely on some weak validation of textual input used to build database queries. Maliciously crafted input may threaten the confidentiality and the security policies of Web sites relying on a database to store and retrieve information. Furthermore, insiders may introduce malicious code in a Web application, code that, when triggered by some specific input, for exampl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.