By Topic

[1993] Proceedings Working Conference on Reverse Engineering

21-23 May 1993

Filter Results

Displaying Results 1 - 24 of 24
  • Proceedings of Working Conference on Reverse Engineering

    Publication Year: 1993
    Request permission for commercial reuse | PDF file iconPDF (180 KB)
    Freely Available from IEEE
  • Reverse engineering programs via dynamic analysis

    Publication Year: 1993, Page(s):192 - 201
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    A tool-supported approach to extracting information about programs via a dynamic analysis of the program behavior is described. The information obtained in this fashion is intended to supplement the information gained through the static analysis of the program source. By joining the two different views of a program, it is hoped that a more complete specification of the program function may be deve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design recovery for software testing of object-oriented programs

    Publication Year: 1993, Page(s):202 - 211
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    A reverse engineering approach for software testing of object-oriented programs is described. The approach is based on a graphic model which consists of three types of diagrams: object relation diagrams; block branch diagrams; and object state diagrams. These diagrams may be used to provide guidance on the order to test the classes and member functions; prepare member function test cases; prepare ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Separating parsing and analysis in reverse engineering tools

    Publication Year: 1993, Page(s):117 - 125
    Cited by:  Papers (17)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    The authors describe the lessons learned in extending the capabilities of a reverse engineering tool to analyze both an additional dialect of the language it was initially built to parse and a new embedded assembly language. The effort involved in this extension provides data to support the assertion that reverse engineering tools should create a clean separation between parsing the source code an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contribution to a theory of database reverse engineering

    Publication Year: 1993, Page(s):161 - 170
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB)

    Both a general framework and specific techniques for file and database reverse engineering (recovering its conceptual schema) are proposed. The framework relies on a process/product model that matches formal as well as empirical design procedures. Based on the analysis of database design processes, two major phases are defined, i.e., data structure extraction and data structure conceptualization. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical program transformation system for reverse engineering

    Publication Year: 1993, Page(s):212 - 221
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    Program transformation systems provide one means of formally deriving a program from its specification. A tool called ReForm is described. It is designed to address the inverse problem to support the extraction of a specification from existing program code, using transformations. This is an important activity during software maintenance. One of the problems of transformation systems is the scarcit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid approach to recognizing programming plans

    Publication Year: 1993, Page(s):126 - 133
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    A hybrid approach to program understanding is presented. It uses an indexed, hierarchical organization of the plan library to limit the number of candidate plans considered during program understanding. This approach is based on observations made from studying the attempts of student programmers to perform bottom-up understanding on geometrically oriented C functions and relies on a highly organiz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating formal and structured methods in reverse-engineering

    Publication Year: 1993, Page(s):17 - 26
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    The issue of the interaction between structured and formal notations in reverse-engineering and maintenance is discussed, and a process which uses both forms of representation to support application understanding, evaluation, assessment, redesign, and reengineering is described. This process is supported by prototype tools implemented on the REDO toolkit and repository for reverse-engineering View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recovering reusable components from legacy systems by program segmentation

    Publication Year: 1993, Page(s):64 - 72
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (852 KB)

    There are many reasons to retire a legacy system. But the system may contain critical business rules and other reusable assets that are not explicitly documented anywhere else. A software reengineering technique called program segmentation is described. It supports the recovery of these reusable assets from old code. This technique consists of a focusing step, which helps the analyst localize, und... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for reverse engineering DoD legacy information systems

    Publication Year: 1993, Page(s):180 - 191
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1100 KB)

    A framework to legacy information systems, which have been selected by reverse engineers, in the US Department of Defense heterogeneous environment, is reported. This approach was developed to recover business rules, domain information, functional requirements, and data architectures, largely in the form of normalized, logical data models. In a pilot study, the data from diverse systems (ranging f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering Control Structure Diagrams

    Publication Year: 1993, Page(s):107 - 116
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB)

    The GRASP/Ada project (Graphical Representations of Algorithms, Structures, and Processes for Ada) has successfully created and prototyped a new algorithmic level graphical representation for Ada software, the Control Structure Diagram (CSD). The primary impetus for creation of the CSD is to improve the comprehension efficiency of Ada software and, as a result, improve reliability and reduce costs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach for reverse engineering of relational databases

    Publication Year: 1993, Page(s):151 - 160
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB)

    A process for reverse engineering of relational databases is proposed. Object-oriented models provide a natural language for facilitating the re-engineering process. An object-oriented model can describe the existing software, the reverse-engineered semantic intent, and the forward-engineered new system. The Object Modeling Technique (OMT) notation for modeling data is adopted. Graphical OMT model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The representation problem in reverse engineering

    Publication Year: 1993, Page(s):8 - 16
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    Formal and explicit model building in reverse engineering focuses attention on modeling as an aid to understanding, and results in artifacts that may be useful to others. Choosing the proper representation during reverse engineering is the representation problem. This problem is examined by presenting a taxonomy of solutions. The issues involved in choosing a representation through an example reve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program and interface slicing for reverse engineering

    Publication Year: 1993, Page(s):54 - 63
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (892 KB)

    Reverse engineering involves a great deal of effort in comprehension of the current implementation of a software system and the ways in which it differs from the original design. Automated support tools are critical to the success of such efforts. It is shown how program slicing techniques can be employed to assist in the comprehension of large software systems, through traditional slicing techniq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering of user interfaces

    Publication Year: 1993, Page(s):171 - 179
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    A method for reverse engineering user interfaces based on their structural and behavioral representations is presented. The interface structure is represented using an object oriented approach while interface behavior is described using Milner's process algebra (CCS). A specification language for user interfaces is designed for the multiple purposes of serving as a target language for the reverse ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automating the modularization of large COBOL programs: application of an enabling technology for reengineering

    Publication Year: 1993, Page(s):222 - 230
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    The development of a tool for modularizing large common business-oriented language (COBOL) programs is described. The motivation for modularizing these programs is discussed, together with a manual modularization process. The business motivation for building a tool to automate the manual process is indicated. An enabling technology and its use in the development of the tool are discussed. Experien... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A prototype system for static and dynamic program understanding

    Publication Year: 1993, Page(s):93 - 106
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2664 KB)

    A tool called PUNDIT (Program Understanding Investigation Tool) is described. It is a prototype intended to serve as a vehicle for exploring and testing ideas in the area of program understanding; it combines static analysis information with information collected at runtime. The architecture of PUNDIT is described, together with its two main components (the C source analyzer and a graphical user i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges to the field of reverse engineering

    Publication Year: 1993, Page(s):144 - 150
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    Ten challenges for improvement in the field of reverse engineering are discussed. These challenges fall into three specific areas: avoiding artificial data, focusing on concrete impact, and facilitating researcher communication. Particular topics discussed are: the use of real programs as examples; the use of systems as examples; the use of multiple information sources; the need to strive for util... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cognitive approach to program understanding

    Publication Year: 1993, Page(s):1 - 7
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    A method of program understanding is presented, based on a cognitive model of programming knowledge, and incorporating the basic concepts, structures, and strategies used by human expert programmers. The approach involves the generation of a high-level description of the program with, as main advantages, the use of abstraction and robustness with respect to conceptual errors. The use of abstractio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recast: reverse engineering from COBOL to SSADM specification

    Publication Year: 1993, Page(s):44 - 53
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    The reverse engineering into CASE technology (RECAST) method takes the source code for an existing common business-oriented language (COBOL) system and derives a no-loss representation of the system documented in a structured systems analysis and design method (SSADM) format. This representation of the system is derived through the use of a series of transformations. The environment within which R... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification and extraction of `domain independent' components in large programs

    Publication Year: 1993, Page(s):83 - 92
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB)

    The problem of the identification and extraction of domain independent components from a large working program lacking complete documentation is addressed. A modified version of Weiser's slice (Direct Slice) is defined, which makes it possible to individuate and extract particular kinds of code segments distributed among many of the modules composing the structure of the working program. Program c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible control for program recognition

    Publication Year: 1993, Page(s):134 - 143
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (812 KB)

    The author reports on the application of recognition to multiple tasks requiring reverse engineering, such as inspecting, maintaining, and reusing software. This requires a flexible, adaptable recognition architecture. A recognition system based on graph parsing has been developed. It has a flexible, adaptable control structure that can accept advice from external agents. Its flexibility arises fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The concept assignment problem in program understanding

    Publication Year: 1993, Page(s):27 - 43
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1372 KB)

    The problem of discovering individual human oriented concepts and assigning them to their implementation-oriented counterparts for a given program is the concept assignment problem. It is argued that the solution to this problem requires methods that have a strong plausible reasoning component. These ideas are illustrated through recovery system called DESIRE. DESIRE is evaluated based on its use ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reverse engineering method for identifying reusable abstract data types

    Publication Year: 1993, Page(s):73 - 82
    Cited by:  Papers (16)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB)

    Results from an experiment in reuse within the RE2 project are presented. It is shown how a particular candidature criterion for identifying abstract data types in existing software systems can be applied both at the theoretical and practical level. The RE2 project is concerned with the exploration of reverse engineering and reengineering techniques to facilitate reuse reengi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.