By Topic

11th Working Conference on Reverse Engineering

8-12 Nov. 2004

Filter Results

Displaying Results 1 - 25 of 45
  • Proceedings. 11th Working Conference on Reverse Engineering

    Publication Year: 2004
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • 11th Working Conference on Reverse Engineering - Title Page

    Publication Year: 2004, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • 11th Working Conference on Reverse Engineering - Copyright Page

    Publication Year: 2004, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • 11th Working Conference on Reverse Engineering - Table of contents

    Publication Year: 2004, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2004, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (26 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2004, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Virus analysis: techniques, tools, and research issues tutorial

    Publication Year: 2004
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (43 KB) | HTML iconHTML

    The tutorial covers techniques, tools, and research issues in analyzing computer viruses. It provides participants the background needed to initiate research in reverse engineering computer viruses. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Engineering for Software Modernization

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (38 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Static and Dynamic Analyses of Programs with Implicit Control Flow

    Publication Year: 2004, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (35 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences with an industrial long-term reengineering project

    Publication Year: 2004, Page(s):8 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    We discuss the experiences gained in a large-scale industrial reengineering project. The subject system is a medical data management software that has been continuously developed and maintained for about twenty years. About four years ago, it has been decided to subsequently reimplement the entire system in Java, while continuing maintenance of the legacy system. The focus of This work is less on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reengineering reports

    Publication Year: 2004, Page(s):17 - 26
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    This contribution to the subject of software reengineering is focused on the reengineering of legacy system reports. The object is to extract the contents of existing print files for the purpose of creating new system interface files in XML. These new XML files can then be used both for system testing and system integration. The XML Schema Language XSD and a subset of the XML Transformation Langua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using a decompiler for real-world source recovery

    Publication Year: 2004, Page(s):27 - 36
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Despite their 40 year history, native executable decompilers have found very limited practical application in commercial projects. The success of Java decompilers is well known, and a few decompilers perform well by recognising patterns from specific compilers. This work describes the experience gained from applying a native executable decompiler, assisted by a commercial disassembler and hand edi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward seamless migration of Java AWT-based applications to personal wireless devices

    Publication Year: 2004, Page(s):38 - 47
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    The spread of personal wireless devices (PWDs) has raised the need to port into this new environment existing (legacy) desktop applications. Unfortunately, these applications are often too large and resource demanding to be executed on devices with limited resources without changing existing code. Consequently, desktop applications should be decomposed in different components to distribute between... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TUAnalyzer - analyzing templates in C++ code

    Publication Year: 2004, Page(s):48 - 57
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    We present TUAnalyzer, a novel tool that extracts the template structure of C++ programs on the basis of the GNU C/C++ compiler's internal representation of a C/C++ translation unit. In comparison to other such tools, our tool is capable of supporting the extraction of function invocations that depend on the particular instantiation of C++ templates and to relate them to their particular template ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Updating legacy databases through wrappers: data consistency management

    Publication Year: 2004, Page(s):58 - 67
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Wrapping databases allows them to be reused in earlier unforeseen contexts, such as Web-based applications or federated systems. Data wrappers, and more specifically updating wrappers (that not only access legacy data but also update them), can provide external clients of an existing (legacy) database with a neutral interface and augmented capabilities. For instance, a collection of COBOL files ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel software visualisation model to support software comprehension

    Publication Year: 2004, Page(s):70 - 79
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    Current software visualisation tools do not address the full range of software comprehension requirements. This paper proposes a novel software visualisation model for supporting object-oriented software comprehension that is intended to address the shortcomings of existing tools. We discuss the previous work that prompted us to develop this model. An initial model is then presented, based on mult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring software evolution using spectrographs

    Publication Year: 2004, Page(s):80 - 89
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Software systems become progressively more complex and difficult to maintain. To facilitate maintenance tasks, project managers and developers often turn to the evolution history of the system to recover various kinds of useful information, such as anomalous phenomena and lost design decisions. An informative visualization of the evolution history can help cope with this complexity by highlighting... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reverse engineering approach to support software maintenance: version control knowledge extraction

    Publication Year: 2004, Page(s):90 - 99
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Most traditional reverse engineering tools focus on abstraction and analysis of source code, presenting a visual representation of the software architecture. This approach can be both helpful and cost effective in software maintenance tasks. However, where large software teams are concerned, with moderate levels of employee turnover, traditional reverse engineering tools can be inadequate. To addr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Insights into system-wide code duplication

    Publication Year: 2004, Page(s):100 - 109
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (936 KB) | HTML iconHTML

    Duplication of code is a common phenomenon in the development and maintenance of large software systems. The detection and removal of duplicated code has become a standard activity during the refactoring phases of a software life-cycle. However, code duplication identification tends to produce large amounts of data making the understanding of the duplication situation as a whole difficult. Reengin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aspect mining through the formal concept analysis of execution traces

    Publication Year: 2004, Page(s):112 - 121
    Cited by:  Papers (60)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    The presence of crosscutting concerns, i.e., functionalities that are not assigned to a single modular unit in the implementation, is one of the major problems in software understanding and evolution. In fact, they are hard to locate (scattering) and may give rise to multiple ripple effects (tangling). Aspect oriented programming offers mechanisms to factor them out into a modular unit, called an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting implicit collaboration patterns

    Publication Year: 2004, Page(s):122 - 131
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    A key problem during software development and maintenance is to detect and recognize recurring collaborations among software artifacts that are implicit in the code. These collaboration patterns are typically signs of applied idioms, conventions and design patterns during the development of the system, and may entail implicit contracts that should be respected during maintenance, but are not docum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying aspects using fan-in analysis

    Publication Year: 2004, Page(s):132 - 141
    Cited by:  Papers (50)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    The issues of code scattering and tangling, thus of achieving a better modularity for a system's concerns, are addressed by the paradigm of aspect orientation. Aspect mining is a reverse engineering process that aims at finding crosscutting concerns in existing systems. This work describes a technique based on determining methods that are called from many different places (and hence have a high fa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refactoring - improving coupling and cohesion of existing code

    Publication Year: 2004, Page(s):144 - 151
    Cited by:  Papers (25)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    Refactorings are widely recognised as ways to improve the internal structure of object-oriented software while maintaining its external behaviour. Unfortunately, refactorings concentrate on the treatment of symptoms (the so called code-smells), thus improvements depend a lot on the skills of the maintained coupling and cohesion on the other hand are quality attributes which are generally recognize... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Loop squashing transformations for amorphous slicing

    Publication Year: 2004, Page(s):152 - 160
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Program slicing is a source code extraction technique that can be used to support reverse engineering by automatically extracting executable subprograms that preserve some aspect of the original program's semantics. Although minimal slices are not generally computable, safe approximate algorithms can be used to good effect. However, the precision of such slicing algorithms is a major factor in det... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Imposing order on program statements to assist anti-virus scanners

    Publication Year: 2004, Page(s):161 - 170
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    A metamorphic virus applies semantics preserving transformations on itself to create a different variant before propagation. Metamorphic computer viruses thwart current anti-virus technologies that use signatures - a fixed sequence of bytes from a sample of a virus - since two variants of a metamorphic virus may not share the same signature. A method to impose an order on the statements and compon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.