Proceedings of 2nd Working Conference on Reverse Engineering

14-16 July 1995

Filter Results

Displaying Results 1 - 25 of 36
  • Proceedings of 2nd Working Conference on Reverse Engineering

    Publication Year: 1995
    Request permission for reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Using generalized markup and SGML for reverse engineering graphical representations of software

    Publication Year: 1995, Page(s):2 - 6
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (498 KB)

    As part of the ongoing research of Auburn University's GRASP (Graphical Representations of Algorithms, Structures and Processes) project, a markup language has been designed and prototyped to facilitate the automatic generation of static program visualizations from source code. Specifically, the latest release of the GRASP/Ada tool uses a markup language called GRASP-ML as the basis for automatica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automating testing by reverse engineering of software documentation

    Publication Year: 1995, Page(s):8 - 12
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (475 KB)

    Reverse engineering of software documentation can play an important role in automating software testing. Since testers often compare the operation of a software system to the expected behavior as described in a document, information extraction from texts can provide valuable input to automated test systems. This paper describes the SIFT (Specification Information From Text) document parser and its... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recovering business rules from structured analysis specifications

    Publication Year: 1995, Page(s):13 - 21
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (887 KB)

    Reports on research geared toward recovering high-level abstractions from structured specifications. Our research goal is to investigate how other sources besides code can be used in the reverse engineering of software systems. Departing from structured specifications, we designed a process to recover business rules and domain facts. We use a simple representation scheme based on natural language ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Retrieving information from data flow diagrams

    Publication Year: 1995, Page(s):22 - 29
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (581 KB)

    For reverse engineering, we need tools that can extract information from documents written before routine digital storage was feasible. Documents contain both text and diagrams; data flow diagrams play a prominent role in software documents. Using current techniques, it is possible to recover the information in a data flow diagram by scanning the printed document and processing the data obtained. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reengineering procedural into data flow programs

    Publication Year: 1995, Page(s):32 - 38
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (718 KB)

    Program transformation techniques are described for automatic translation of systems from a procedural form into a non-procedural, event-driven, data-flow computational architecture called the quasi-procedural method (QPM). Significant performance optimizations are achieved for many kinds of computations after conversion of their programs into QPM. The translation into QPM is accomplished with a k... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RESCUE: legacy systems translator

    Publication Year: 1995, Page(s):39 - 50
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1181 KB)

    Shows theoretical and practical results of a research project developed by ArtInSoft SA. First, it shows the theoretical basis required to automatically translate computer programs by means of deduction. As it is implemented in the Logistica language, deduction is performed by an expression rewriting process which preserves equivalence in each deduction step, therefore guaranteeing translation cor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Legacy System Cataloging Facility

    Publication Year: 1995, Page(s):52 - 60
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (985 KB)

    Describes a software model construction and management tool that provides a foundation for legacy systems modeling, analysis and transformation on an enterprise scale. The Legacy System Cataloging Facility provides a scalable, multi-tiered hierarchical storage mechanism for managing legacy system as persistent, high-fidelity software models within a distributed-computing framework. The Legacy Syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a generic reverse engineering assistant tool

    Publication Year: 1995, Page(s):61 - 70
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1038 KB)

    Reverse engineering is a knowledge-intensive process. We believe the involvement of a domain expert is critical in any but a trivial reverse engineering task. Our approach to reverse engineering assumes close cooperation between a domain expert and a knowledge-based reverse engineering assistant tool. Reverse engineering progresses in steps. At each step, a tool applies heuristic rules to extract ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Customized tools for software quality assurance and reengineering

    Publication Year: 1995, Page(s):71 - 77
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    Describes a new approach to developing tools for measuring and documenting source code compliance with design and coding standards. It also presents preliminary results of applying this approach to software developed for the electrical utility industry. The approach is based on an enabling technology for software evaluation and reengineering. The key technical ideas underlying the technology are t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating reengineering, reuse and specification tool environments to enable reverse engineering

    Publication Year: 1995, Page(s):78 - 84
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    Describes ongoing work to integrate three tool environments and then discusses some of the implications of this work. Considering the number of legacy systems which must be migrated to new software and hardware disciplines, it is necessary to target existing and developing tools to aid in this migration process. Utilizing these existing tools and their repositories, while developing new tools, wil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On finding duplication and near-duplication in large software systems

    Publication Year: 1995, Page(s):86 - 95
    Cited by:  Papers (265)  |  Patents (10)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (992 KB)

    This paper describes how a program called dup can be used to locate instances of duplication or near-duplication in a software system. Dup reports both textually identical sections of code and sections that are the same textually except for systematic substitution of one set of variable names and constants for another. Further processing locates longer sections of code that are the same except for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern matching for design concept localization

    Publication Year: 1995, Page(s):96 - 103
    Cited by:  Papers (25)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    The effective synergy of a number of different techniques is the key to the successful development of an efficient reverse engineering environment. Compiler technology, pattern matching techniques, visualization tools, and software repositories play an important role for the identification of procedural, data, and abstract-data-type related concepts in the source code. This paper describes a numbe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing empirical data from a reverse engineering project

    Publication Year: 1995, Page(s):106 - 114
    Cited by:  Papers (10)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (730 KB)

    This study reports the analysis of data collected during the execution of a reverse engineering process in a real environment. Essentially, the analysis assessed productivity aspects. The experience showed the need for automatic tools which can be adapted to the context the process is performed in and the possibility of anchoring the effort required for the reverse engineering to the desired produ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Observed idiosyncracies of relational database designs

    Publication Year: 1995, Page(s):116 - 125
    Cited by:  Papers (25)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (948 KB)

    Several processes have been advanced in the literature for reverse engineering of relational databases. The inputs to these processes are relational tables and available contextual information. The output is a model of the underlying logical intent, apart from the implementation artifacts. Most of the existing processes for database reverse engineering are inadequate; they assume too high a qualit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deriving a logical data model for a system using the RECAST method

    Publication Year: 1995, Page(s):126 - 135
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    The Reverse Engineering into CASE Technology method (RECAST) takes the source code for an existing COBOL system and derives a no-loss representation of the system documented in the format of Structured Systems Analysis and Design Method (SSADM) documentation. One key element of the method is the abstraction of the system data and its representation as a logical data model. The RECAST method consid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements for information system reverse engineering support

    Publication Year: 1995, Page(s):136 - 145
    Cited by:  Papers (18)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1223 KB)

    This paper proposes a general architecture for information systems (or data-centered applications) reverse engineering CASE environments. Recovering the specifications of such applications requires recovering first those of their data, i.e. database reverse engineering (DBRE). First, the paper describes a generic DMS-independent DBRE methodology, then it analyses the main characteristics of DBRE a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • August-II: a tool for step-by-step data model reverse engineering

    Publication Year: 1995, Page(s):146 - 154
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (871 KB)

    August-II is a data reverse engineering tool whose input can be from a variety of sources from COBOL record layouts to DB/2 data definitions. The translation that is done is designed to produce a conceptual data model to that allows the user to understand the current environment and to move to new data technology. August-II produces output that can be used as input to many different software packa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DECODE: a cooperative environment for reverse-engineering legacy software

    Publication Year: 1995, Page(s):156 - 165
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1174 KB)

    While automated program understanders have had some success in partially extracting design information from source code, they are unlikely to be able to completely understand existing real-world legacy systems. To address this problem, we have been developing DECODE, an environment in which programmer and system cooperate to extract object-oriented designs from legacy systems. DECODE consists of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The interleaving problem in program understanding

    Publication Year: 1995, Page(s):166 - 175
    Cited by:  Papers (26)  |  Patents (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1021 KB)

    One of the factors that can make a program difficult to understand is that code responsible for accomplishing more than one purpose may be woven together in a single section. We call this interleaving, and it may arise either intentionally-for example, in optimizing a program, a programmer may use some intermediate result for several purposes-or unintentionally, due to patches, quick fixes, or oth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Qualifying reusable functions using symbolic execution

    Publication Year: 1995, Page(s):178 - 187
    Cited by:  Papers (22)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1127 KB)

    We present an approach to reverse engineering source code modules to abstract their interface and functional specifications. A fine-grained program representation for C programs, the Combined C Graph (CGG), is used to perform dynamic analysis of a module by means of symbolic execution techniques. We focus on problems like pointer variables and expressions containing embedded side-effects and contr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strongest postcondition semantics as the formal basis for reverse engineering

    Publication Year: 1995, Page(s):188 - 197
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (960 KB)

    Reverse engineering of program code is the process of constructing a higher level abstraction of an implementation in order to facilitate the understanding of a system that may be in a "legacy" or "geriatric" state. Changing architectures and improvements in programming methods, including formal methods in software development and object-oriented programming, have prompted a need to reverse engine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal representation of reuseable software modules

    Publication Year: 1995, Page(s):198 - 205
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (693 KB)

    Recovering design information from software is an active research area in reverse engineering. If the extracted information is represented formally, we are able to process the information at the semantic level for analysis and reasoning. We describe a formal approach to representing modules. A module encapsulates a collection of dependent components. The main feature of the formalism is characteri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding objects in procedural programs: an alternative approach

    Publication Year: 1995, Page(s):208 - 216
    Cited by:  Papers (33)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (731 KB)

    Effective software maintenance requires a detailed knowledge of the system's artifacts, the way these artifacts are used or modified and their interrelationships. Based on some useful characteristics of the object-oriented paradigm the identification of objects within procedural programs has become a promising approach to reduce the effort in program understanding and, hence, the maintenance cost.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting object-oriented specification from procedurally oriented programs

    Publication Year: 1995, Page(s):217 - 226
    Cited by:  Papers (25)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    There is an increasing demand to migrate legacy programs from the mainframe to networked workstation computers. An important prerequisite to such migrations is an adequate and up-to-date documentation of the programs. Since the programs often have to be redesigned, the documentation must reflect the current program design in such a manner that this may be used as a blueprint for reimplementation. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.