Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Proceedings Eighth Working Conference on Reverse Engineering

2-5 Oct. 2001

Filter Results

Displaying Results 1 - 25 of 40
  • Proceedings Eighth Working Conference on Reverse Engineering

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (203 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s): 381
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • CRAFT: a framework for evaluating software clustering results in the absence of benchmark decompositions [Clustering Results Analysis Framework and Tools]

    Publication Year: 2001, Page(s):93 - 102
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1048 KB) | HTML iconHTML

    Software clustering algorithms are used to create high-level views of a system's structure using source code-level artifacts. Software clustering is an active area of research that has produced many clustering algorithms. However, we have so far seen very little work that investigates how the results of these algorithms can be evaluated objectively in the absence of a benchmark decomposition or wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing type-based and proof-directed decompilation

    Publication Year: 2001, Page(s):362 - 367
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    In the past couple of years interest in decompilation has widened from its initial concentration on reconstruction of control flow into well-founded-in-theory methods to reconstruct type information. A. Mycroft (1999) described Type-Based Decompilation and S. Katsumata and A. Ohori (2001) described Proof-Directed Decompilation. The article summarises the two approaches and identifies their commona... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling the system-user dialog using interaction traces

    Publication Year: 2001, Page(s):208 - 217
    Cited by:  Papers (13)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB) | HTML iconHTML

    It is generally the case that some user interface (UI) reverse engineering is needed for every non-trivial reengineering project. Typically, this is done through code analysis, which can be very difficult and/or expensive. When code analysis is not a must, as for wrapping purposes, system-user interaction can be an alternative input for the reverse engineering process. In the CelLEST project, we h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maximizing functional cohesion of comprehension environments by integrating user and task knowledge

    Publication Year: 2001, Page(s):157 - 165
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB) | HTML iconHTML

    Program comprehension tools should facilitate the comprehension strategies used by programmers to achieve specific tasks. Many reverse engineering tools have been developed to derive abstract representations from existing source code and to apply a variety of analysis techniques. Yet, most of these software programs fail to provide users with the necessary guidance in choosing the appropriate meth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of UML associations and their adornments in design recovery

    Publication Year: 2001, Page(s):81 - 90
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB) | HTML iconHTML

    Many CASE tools support reverse engineering and UML. However, it can be observed that, usually, only a subset of the UML notation is supported, namely those parts with a more or less direct code representation. Although a lot of research has been done in this field, the more advanced features of UML notations are not commonly supported in reverse engineering. In this paper, we show approaches to d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simple type system for program reengineering

    Publication Year: 2001, Page(s):357 - 361
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    This paper describes a type system used in a disassembler program to produce enhanced disassembly output The type system described in this paper is capable of representing C language types. It operates using the following methodology. First, the type information is collected from the standard C headers and is stored in type library files. The stored information is then used to comment and enhance ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wrapper development for legacy data reuse

    Publication Year: 2001, Page(s):198 - 207
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB) | HTML iconHTML

    This paper is devoted to the technology of wrappers for legacy data systems reuse. Their characteristics are outlined and a generic wrapper architecture is defined. This architecture is intended to be instantiated for specific legacy data models and systems. A general methodology is proposed to define the architecture components. The methodology is supported by an operational CASE tool that helps ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A retrospective on industrial database reverse engineering projects - part 2

    Publication Year: 2001, Page(s):147 - 153
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB) | HTML iconHTML

    For pt.1 see ibid., p.136-46 (2001). The paper continues the compilation of results from the reverse engineering of 35 databases. It presents a series of standard observations and their variation across the databases. It reports additional experimental data from database reverse engineering. The paper yields insight into the state of the practice for database design. It is clear that the current p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive migration of legacy databases to net-centric technologies

    Publication Year: 2001, Page(s):328 - 334
    Cited by:  Papers (2)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB) | HTML iconHTML

    Due to the rapid growth of e-commerce (and other Internet-related technologies), many companies want to migrate their information systems to the net-centric environment. We are proposing a toolkit (Varlet/Babel) that helps the user to achieve this goal. This is accomplished in two stages. In the first stage, a database schema is obtained and refined, then an XML description for the database schema... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements-driven software re-engineering framework

    Publication Year: 2001, Page(s):71 - 80
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1248 KB) | HTML iconHTML

    Software re-engineering projects such as migrating code from one platform to another or restructuring a monolithic system into a modular architecture are popular maintenance tasks. Usually, projects of this type have to conform to hard and soft quality constraints (or non-functional requirements) such as "the migrant system must run as fast as the original", or "the new system should be more maint... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer security analysis through decompilation and high-level debugging

    Publication Year: 2001, Page(s):375 - 380
    Cited by:  Papers (6)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    The extensive use of computers and networks worldwide has raised the awareness of the need for tools and techniques to aid in computer security analysis of binary code, such as the understanding of viruses, trojans, worms, backdoors and general security flaws, in order to provide immediate solutions with or without the aid of software vendors. The paper is a proposal for a high-level debugging too... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach for reverse engineering of web-based applications

    Publication Year: 2001, Page(s):231 - 240
    Cited by:  Papers (24)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB) | HTML iconHTML

    The new possibilities offered by WEB applications are pervasively and radically changing several areas. WEB applications, compared to WEB sites, offer substantially greater opportunities: a WEB application provides the WEB user with a means to modify the site status. WEB applications must cope with an extremely short development/evolution life cycle. Usually, they are implemented without producing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assisting the comprehension of legacy transactions

    Publication Year: 2001, Page(s):345 - 354
    Cited by:  Papers (4)  |  Patents (37)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB) | HTML iconHTML

    One of the principal aims of data reverse engineering is to facilitate comprehension of the internal structure and behaviour of data-intensive systems by programmers. However the majority of the research in this area has so far concentrated on the development of techniques to assist comprehension of the data structures used by such systems, and much less attention has been paid to the equally pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering to achieve maintainable WWW sites

    Publication Year: 2001, Page(s):249 - 257
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB) | HTML iconHTML

    The growth of the World Wide Web and the accelerated development of web sites and associated web technologies has resulted in a variety of maintenance problems. The maintenance problems associated with web sites and the WWW are examined. It is argued that currently web sites and the WWW lack both data abstractions and structures that could facilitate maintenance. A system to analyse existing web s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wrapping legacy COBOL programs behind an XML-interface

    Publication Year: 2001, Page(s):189 - 197
    Cited by:  Papers (19)  |  Patents (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    This paper describes the tools and techniques for encapsulating host COBOL programs with an XML interface. The legacy programs are divided into three classes - online programs, batch programs and subprograms. For each program type, a different wrapping technique and a different tool is employed. Online programs are transformed into data-driven subprograms which process an XML document. Batch progr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preprocessor conditional removal by simple partial evaluation

    Publication Year: 2001, Page(s):281 - 290
    Cited by:  Papers (23)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB) | HTML iconHTML

    Preprocessors with conditionals are often used as software configuration management tools, with preprocessor variables naming configuration aspects. The preprocessor conditionals found in large systems often have complex enabling Boolean equations and nesting. Over long periods, some configuration aspects lose all utility. Removal of all traces of a configuration variable and code dependent on tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A retrospective on industrial database reverse engineering projects. 1

    Publication Year: 2001, Page(s):136 - 146
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (888 KB) | HTML iconHTML

    This paper presents a compilation of results from the reverse engineering of 35 databases. All the work was performed by the same reverse engineer (the author) over the past nine years. Since the quantity of data is large, it has been split between two papers View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lessons learned in data reverse engineering

    Publication Year: 2001, Page(s):323 - 327
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    Reverse engineering of data has been performed in one form or another for over twenty-five years (1976-2001 approx.). The author describe the lessons learned in data reverse engineering (DRE) as contributed in a survey of data reverse engineers. Interesting is the fact that some of the lessons learned tell us how we are doing in the process of initial database design as well as how difficult the D... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Union schemas as a basis for a C++ extractor

    Publication Year: 2001, Page(s):59 - 67
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB) | HTML iconHTML

    An extractor is a program which processes source code and outputs facts about the code in a software exchange format (SEF). An SEF can be further specified by a schema, analogous to a schema for a database. This paper explains how two such schemas can be combined into a union schema as the basis for creating an extractor. We describe CPPX (C Plus Plus eXtractor), which transforms a schema designed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating robust parsers using island grammars

    Publication Year: 2001, Page(s):13 - 22
    Cited by:  Papers (74)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (928 KB) | HTML iconHTML

    Source model extraction, the automated extraction of information from system artifacts, is a common phase in reverse engineering tools. One of the major challenges of this phase is creating extractors that can deal with irregularities in the artifacts that are typical for the reverse engineering domain (for example, syntactic errors, incomplete source code, language dialects and embedded languages... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Component clustering based on maximal association

    Publication Year: 2001, Page(s):103 - 114
    Cited by:  Papers (17)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1096 KB) | HTML iconHTML

    Presents a supervised clustering framework for recovering the architecture of a software system. The technique measures the association between the system components (such as files) in terms of data and control flow dependencies among the groups of highly related entities that are scattered throughout the components. The application of data mining techniques allows us to extract the maximum associ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decompiling Java using staged encapsulation

    Publication Year: 2001, Page(s):368 - 374
    Cited by:  Papers (12)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    The paper presents an approach to program structuring for use in decompiling Java bytecode to Java source. The structuring approach uses three intermediate representations: (1) a list of typed, aggregated statements with an associated exception table, (2) a control flow graph, and (3) a structure encapsulation tree. The approach works in six distinct stages, with each stage focusing on a specific ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • REportal: a Web-based portal site for reverse engineering

    Publication Year: 2001, Page(s):221 - 230
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB) | HTML iconHTML

    We present a Web-based portal site for the reverse engineering of software systems, called REportal (Reverse Engineering portal). REportal enables authorized users to upload their code to a secure Web site and then, through the guidance of wizards, to browse and analyze their code. Currently, the portal services include code analysis, browsing, querying and design extraction for C, C++ and Java pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.