By Topic

2012 19th Working Conference on Reverse Engineering

15-18 Oct. 2012

Filter Results

Displaying Results 1 - 25 of 70
  • [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (281 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • Message from the Chairs

    Publication Year: 2012, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (91 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2012, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Keynote: Software engineering for a smarter planet situation-aware applications

    Publication Year: 2012, Page(s): xvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (123 KB)

    Summary form only given, as follows. The growing popularity of smart devices and applications is accelerating the convergence of the physical and the digital worlds. Smart apps allow users, with the help of sensors and networks, to do a great variety of things, from tracking their friends to controlling remote devices. At the core of such smart systems are self-adaptive systems. Self-adaptive syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Industrial keynote: Software protection and reverse engineering

    Publication Year: 2012, Page(s): xviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (589 KB)

    Summary form only given. In this presentation, we would like to discuss white-box attacks and vulnerability in real world and why software protection is important, introduction to software protection technology and software security lifecycle management. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assuring software quality by code smell detection

    Publication Year: 2012, Page(s): xix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (93 KB) | HTML iconHTML

    In this retrospective we will review the paper "Java Quality Assurance by Detecting Code Smells" that was published ten years ago at WCRE. The work presents an approach for the automatic detection and visualization of code smells and discusses how this approach could be used in the design of a software inspection tool. The feasibility of the proposed approach was illustrated with the development o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Law and Reverse Engineering

    Publication Year: 2012, Page(s):3 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (105 KB) | HTML iconHTML

    Almost all software contracts that are not open-source contain broad bans on reverse engineering, but as far as we can tell, almost all professional software development does reverse engineering to some degree. This is a fundamental, unresolved conflict. Every student and practitioner of software of engineering will face reverse engineering issues and they will have to make their own decisions abo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshop on Mining Unstructured Data (MUD) ... Because "Mining Unstructured Data is Like Fishing in Muddy Waters"!

    Publication Year: 2012, Page(s):5 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    Software developers have long been supported by a variety of tools, such as version control systems (e.g., GIT), issue tracking systems (e.g., BugZilla), and mailing list services (e.g., Mailman). These tools accumulate a wide range of information that is recorded in the repositories these tools store their data in. This information is comprised of two significantly different types of data: struct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structured Binary Editing with a CFG Transformation Algebra

    Publication Year: 2012, Page(s):9 - 18
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    Binary modification allows users to alter existing code or inject new code into programs without requiring source code, symbols, or debugging information. It is critically important that such modification not accidentally create a structurally invalid binary that has illegal control flow or executes invalid instructions. Unfortunately, current modification tools do not make this guarantee, instead... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • C to O-O Translation: Beyond the Easy Stuff

    Publication Year: 2012, Page(s):19 - 28
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    Can we reuse some of the huge code-base developed in C to take advantage of modern programming language features such as type safety, object-orientation, and contracts? This paper presents a source-to-source translation of C code into Eiffel, a modern object-oriented programming language, and the supporting tool C2Eif. The translation is completely automatic and supports the entire C language (ANS... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refactoring with Unit Testing: A Match Made in Heaven?

    Publication Year: 2012, Page(s):29 - 38
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    Unit testing is a basic principle of agile development. Its benefits include early defect detection, defect cause localization and removal of fear to apply changes to the code. As such, unit tests seem to be ideal companions during refactoring, as they provide a safety net which enables to quickly verify that behaviour is indeed preserved. In this study we investigate whether having unit tests ava... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Astra: Bottom-up Construction of Structured Artifact Repositories

    Publication Year: 2012, Page(s):41 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Structured artifact repositories, such as Java's Maven Central Repository, provide developers with the ability to easily locate and manage their programs' external dependencies. Unfortunately, these artifact repositories are often missing popular libraries, dramatically decreasing their usefulness. Our investigation of the scope of the Maven Central Repository showed that it is missing over 60% of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection and Recovery of Functions and their Arguments in a Retargetable Decompiler

    Publication Year: 2012, Page(s):51 - 60
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    Detection and recovery of high-level control structures, such as functions and their arguments, plays an important role in decompilation. It has a direct impact on the quality of the generated code because it is needed for generating functionally equivalent and highly readable code. In this paper, we present an innovative, platform-independent method of detection and recovery of functions and thei... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Static Analysis of Virtualization-Obfuscated Binaries

    Publication Year: 2012, Page(s):61 - 70
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    Virtualization-obfuscation protects a program from manual or automated analysis by compiling it into byte code for a randomized virtual architecture and attaching a corresponding interpreter. Static analysis appears to be helpless on such programs, where only the code of the interpreter is directly visible. In this paper, we explain the particular challenges for statically analyzing the combinatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Code Defactoring: Evaluating the Effectiveness of Java Obfuscations

    Publication Year: 2012, Page(s):71 - 80
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    Obfuscation is a very common protection against reverse engineering attacks: it modifies a program structure to make it harder for the adversary to analyse and understand it. Conceptually, obfuscation is the opposite of refactoring: the code should be more complex to understand, bloated, and with excessive characteristics from the design point of view. This paper aims at evaluating the code comple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding Android Fragmentation with Topic Analysis of Vendor-Specific Bugs

    Publication Year: 2012, Page(s):83 - 92
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (802 KB) | HTML iconHTML

    The fragmentation of the Android ecosystem causes portability and compatibility issues within the entire Android platform, which increases developer workload, delays application deployment, and ultimately disappoints users. This subject is discussed in the press and in scientific publications but it has yet to be systematically examined. The Android bug reports, as submitted by Android-device user... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Network Analysis for Recommendation of Central Software Classes

    Publication Year: 2012, Page(s):93 - 102
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    As a new developer, getting to know a large unknown software system is a challenging task. If experienced developers are available, they can suggest which classes to read first, helping new developers to quickly grasp the system's most fundamental concepts. In practice, however, experienced developers often are no longer available. In these cases, the set of most important classes must be reverse ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TRIS: A Fast and Accurate Identifiers Splitting and Expansion Algorithm

    Publication Year: 2012, Page(s):103 - 112
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    Understanding source code identifiers, by identifying words composing them, is a necessary step for many program comprehension, reverse engineering, or redocumentation tasks. To this aim, researchers have proposed several identifier splitting and expansion approaches such as Samurai, TIDIER and more recently GenTest. The ultimate goal of such approaches is to help disambiguating conceptual informa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.