By Topic

2009 16th Working Conference on Reverse Engineering

Date 13-16 Oct. 2009

Filter Results

Displaying Results 1 - 25 of 60
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (365 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2009, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (76 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2009, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (101 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2009, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2009, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Beyond the Lone Reverse Engineer: Insourcing, Outsourcing and Crowdsourcing

    Publication Year: 2009, Page(s): 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (85 KB)

    When one imagines a reverse engineer at work, an image that often comes to mind is that of a lone engineer using advanced tools to help in design recovery. However, in practice the engineer may be part of a team that has to tackle the arduous task of documenting a system's design. Often, such a team will be distributed and may have to work in an asynchronous manner. Moreover, sharing and combining... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Legacy and Future of Data Reverse Engineering

    Publication Year: 2009, Page(s): 4
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    Data(base) reverse engineering is the process through which the missing technical and/or semantic schemas of a database (or, equivalently, of a set of files) are reconstructed. If carefully performed, this process allows legacy databases to be safely maintained, extended, migrated to modern platforms or merged with other, possibly heterogeneous, databases. Although this process is mostly pertinent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ten Years Later, Experiments with Clustering as a Software Remodularization Method

    Publication Year: 2009, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (97 KB)

    In this talk we will first review our research program that led to the paper which has been designated the most influential paper from WCRE 1999. The paper discussed a wide variety of aspects to be considered when clustering software, including formal and nonformal descriptive features, the types of links, the similarity metrics, the clustering algorithms themselves, as well as criteria to evaluat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Who are Source Code Contributors and How do they Change?

    Publication Year: 2009, Page(s):11 - 20
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    Determining who are the copyright owners of a software system is important as they are the individuals and organizations that license the software to its users, and ultimately the legal entities that can enforce its licensing terms and change its license. In this paper we describe the difficulties of identifying the explicit copyright owners of a system, and those who contribute source code to it-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study of the Time Dependence of Code Changes

    Publication Year: 2009, Page(s):21 - 30
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (937 KB) | HTML iconHTML

    Much of modern software development consists of building on older changes. Older periods provide the structure (e.g., functions and data types) on which changes in future periods will build. Given a particular period in the lifetime of a project, one can determine prior periods on which it builds, and future periods which build on it. Using this knowledge, managers can identify foundational period... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relating Identifier Naming Flaws and Code Quality: An Empirical Study

    Publication Year: 2009, Page(s):31 - 35
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Studies have demonstrated the importance of good identifier names to program comprehension. It is unclear, however, whether poor naming has other effects that might impact maintenance effort, e.g. on code quality. We evaluated the quality of identifier names in 8 established open source Java applications libraries, using a set of 12 identifier naming guidelines. We found statistically significant ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Techniques for Identifying the Country Origin of Mailing List Participants

    Publication Year: 2009, Page(s):36 - 40
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    Developer mailing lists play a central role in facilitating communication in open source projects. Participants from different countries and across diverse time zones discuss and resolve important design decisions or conflicts. A good understanding of the social structure of these mailing lists helps in managing these projects and in shaping their implementation structure (i.e., design and archite... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NTrace: Function Boundary Tracing for Windows on IA-32

    Publication Year: 2009, Page(s):43 - 52
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    For a long time, dynamic tracing has been an enabling technique for reverse engineering tools. Tracing can not only be used to record the control flow of a particular component such as a piece of malware itself, it is also a way to analyze the interactions of a component and their impact on the rest of the system. Unlike Unix-based systems, for which several dynamic tracing tools are available, Wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recovering Views of Inter-System Interaction Behaviors

    Publication Year: 2009, Page(s):53 - 61
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    This paper presents an approach for recovering application-level views of the interaction behaviors between systems that communicate via networks. Rather than illustrating a single behavior, a sequence diagram is constructed that describes the characteristics of multiple combined behaviors. The approach has several properties that make it particularly suitable for analyzing heterogeneous systems. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Quantified Temporal Rules: Formalism, Algorithms, and Evaluation

    Publication Year: 2009, Page(s):62 - 71
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (549 KB) | HTML iconHTML

    Libraries usually impose constraints on how clients should use them. Often these constraints are not well-documented. In this paper, we address the problem of recovering such constraints automatically, a problem referred to as specification mining. Given some client programs that use a given library, we identify constraints on the library usage that are (almost) satisfied by the given set of clien... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Exploratory Study of the Impact of Code Smells on Software Change-proneness

    Publication Year: 2009, Page(s):75 - 84
    Cited by:  Papers (43)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    Code smells are poor implementation choices, thought to make object-oriented systems hard to maintain. In this study, we investigate if classes with code smells are more change-prone than classes without smells. Specifically, we test the general hypothesis: classes with code smells are not more change prone than other classes. We detect 29 code smells in 9 releases of Azureus and in 13 releases of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Study on Inconsistent Changes to Code Clones at Release Level

    Publication Year: 2009, Page(s):85 - 94
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (946 KB) | HTML iconHTML

    Current research on code clones tries to address the question whether or not code clones are harmful for the quality of software. As most of these studies are based on the fine-grained analysis of inconsistent changes at the revision level, they capture much of the chaotic and experimental nature inherent to any ongoing software development process. Conclusions drawn from the inspection of highly ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lexicon Bad Smells in Software

    Publication Year: 2009, Page(s):95 - 99
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (549 KB) | HTML iconHTML

    We introduce the notion of "lexicon bad smell", which parallels that of "code smell" and indicates some potential lexicon construction problems that can be addressed through refactoring (e.g., renaming). We created a catalog of lexicon bad smells and we developed a publicly available suite of detectors to locate them. The paper presents a case study in which we used the detectors on two open-sourc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Package Coupling and Cycle Minimization

    Publication Year: 2009, Page(s):103 - 112
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (494 KB) | HTML iconHTML

    Object-oriented (OO) software is usually organized into subsystems using the concepts of package or module.Such modular structure helps applications to evolve when facing new requirements.However, studies show that as software evolves to meet requirements and environment changes, modularization quality degrades. To help maintainers improve the quality of software modularization we have designed an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.