Reverse Engineering, 1996., Proceedings of the Third Working Conference on

11-10 Nov. 1996

Filter Results

Displaying Results 1 - 25 of 32
  • Proceedings of WCRE '96: 4rd Working Conference on Reverse Engineering

    Publication Year: 1996
    Request permission for reuse | PDF file iconPDF (171 KB)
    Freely Available from IEEE
  • Finding reusable software components in large systems

    Publication Year: 1996, Page(s):2 - 10
    Cited by:  Papers (10)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (958 KB)

    The extraction of reusable software components from existing systems is an attractive idea. The goal of the paper is not to extract a component automatically, but to identify its tightly coupled region (subsystem) for extraction by hand or knowledge-based system. Much of the author's experience is anecdotal. His experience with scientific systems differs from much of the work in reverse engineerin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reengineering real-time embedded software onto a parallel processing platform

    Publication Year: 1996, Page(s):11 - 19
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1107 KB)

    The paper describes a general reengineering process that SED uses as a guideline and the specific reengineering process used in the context of a missile onboard software reengineering experiment. The experiment involves retargeting from a single processor to a scaleable, distributed, multiprocessor implementation. It also discusses the role of a domain specific software architecture, and describes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some experiments toward understanding how program plan recognition algorithms scale

    Publication Year: 1996, Page(s):21 - 30
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (875 KB)

    Over the past decade, researchers in program understanding have formulated many program understanding algorithms but have published few studies of their relative scalability. Consequently, it is difficult to understand the relative limitations of these algorithms and to determine whether the field of program understanding is making progress. The paper attempts to address this deficiency by formali... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On designing an experiment to evaluate a reverse engineering tool

    Publication Year: 1996, Page(s):31 - 40
    Cited by:  Papers (31)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1368 KB)

    The Rigi reverse engineering system is designed to analyze and summarize the structure of large software systems. Two contrasting approaches are available for visualizing software structures in the Rigi graph editor. The first approach displays the structures through multiple, individual windows. The second approach, simple hierarchical multi-perspective (SHriMP) views, employs fisheye views of ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rule-based detection for reverse engineering user interfaces

    Publication Year: 1996, Page(s):42 - 48
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (683 KB)

    Reengineering the user interface can be a critical part of the migration of any large information system. The paper details experiences with manually reverse engineering legacy applications to build a model of the user interface functionality, and to develop a technique for partially automating this process. The results show that a language-independent set of rules can be used to detect user inter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Partial automation of an integrated reverse engineering environment of binary code

    Publication Year: 1996, Page(s):50 - 56
    Cited by:  Papers (7)  |  Patents (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (667 KB)

    The constant development of newer and faster machines requires software to be made available on those new machines at a rate faster than what it takes to develop the software. The use of binary translation techniques to migrate software from one machine to another is effective-it makes software available in little time without incurring reprogramming costs. However the development of such a tool i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mandrake: a tool for reverse-engineering IBM assembly code

    Publication Year: 1996, Page(s):57 - 66
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1000 KB)

    Assembly language code provides both a daunting challenge and a sterling opportunity for software reengineering. Ideally, one would like a system which, when fed assembly code, would automatically produce quality, maintainable high-level programs. That ideal, if not impossible, is certainly far beyond current technology. However, automation can profitably be applied to part of the task of reverse ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering of assembler programs: a model-based approach and its logical basis

    Publication Year: 1996, Page(s):67 - 75
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (868 KB)

    The REAP project at InterGlossa is developing tools to support maintenance and reverse engineering of assembly language programs, concentrating on well-engineered hand-coded programs. Abstraction of assembly programs takes place in the context of a selected 'engineering model' which includes the definition of the instruction set semantics but also constraints on the programs similar to those found... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A portable assembler reverse engineering environment (PARE)

    Publication Year: 1996, Page(s):76 - 85
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1036 KB)

    After developing several workbenches for reverse engineering various assembly languages, we developed a portable assembly language reverse engineering environment (PARE). The individual workbenches and the portable version are described. The Language Independent Method (LIM) of programming used to develop the portable workbench is discussed, and issues specific to processing assembly languages as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A catalog of object model transformations

    Publication Year: 1996, Page(s):87 - 96
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (824 KB)

    The process of software development is gradually achieving more rigor. Proficient developers now construct software indirectly through the abstraction of models. Models allow a developer to focus on the essential aspects of an application and defer details. Transformations extend the power of models, as the developer can substitute refinement and optimization of models for tedious manipulation of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creating a research infrastructure for reengineering

    Publication Year: 1996, Page(s):98 - 102
    Cited by:  Papers (11)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (561 KB)

    The field of software reengineering is growing rapidly in response to the critical need that exists in the software industry for technology to support legacy system maintenance and evolutionary development of new systems. As the field matures, it is essential to achieve coherence across the many research efforts that are underway to develop technology to support reengineering. In particular; for r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Encapsulating legacy software for use in client/server systems

    Publication Year: 1996, Page(s):104 - 119
    Cited by:  Papers (38)  |  Patents (14)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (866 KB)

    An alternative to migrating legacy software from the mainframe to a client/server platform is to encapsulate it by wrapping it on the host and accessing it from the new client programs. Recent technological achievements such as the OMG's Common Object Request Broker Architecture (CORBA) and IBM's System Object Model (SOM) have made it possible for distributed objects to communicate with existing a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering a medical database

    Publication Year: 1996, Page(s):121 - 130
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1075 KB)

    An effort to recover an entity-relationship model from an existing medical database is described. This effort examines the applicability of a variety of existing reverse engineering techniques. Problems and limitations encountered with these techniques are discussed. An alternative approach that avoids these limitations is presented, together with examples from the medical database that illustrate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structure elicitation in database reverse engineering

    Publication Year: 1996, Page(s):131 - 140
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1257 KB)

    Recovering the semantic description of file and database structures is an important aspect of business application reverse engineering. It includes a particularly delicate activity, namely data structure extraction, i.e. finding the exact data structures and integrity constraints of the database. This process is made more complex than generally expected due to the fact that these structures and co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining a flexible data model and phase schema translation in data model reverse engineering

    Publication Year: 1996, Page(s):141 - 151
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1226 KB)

    A data reverse engineering tool whose input can be from heterogeneous legacy systems which can range from COBOL record layouts to DB/2 data definitions needs to be able to utilize a flexible data model as well as phase schema translations. The flexible data model allows a designer to fully understand the legacy system as well as know what corrections could be made during conversion to a new implem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and presentation of recovered software architectures

    Publication Year: 1996, Page(s):153 - 162
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1011 KB)

    Since architecture descriptions support multiple software engineering tasks, software architecture recovery tools must attend to accompanying secondary analysis and presentation issues. The authors describe the secondary analysis and presentation capabilities of ManSART, a software architecture recovery tool. As a central part of its design, ManSART contains operators and presentation generators. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GASE: visualizing software evolution-in-the-large

    Publication Year: 1996, Page(s):163 - 167
    Cited by:  Papers (32)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (389 KB)

    Large and long lived software systems, sometimes called legacy systems, must evolve if they are to remain useful. Too often, it is difficult to control or to understand this evolution. The paper presents an approach to visualizing software structural change. A visualization tool, called GASE (Graphical Analyzer for Software Evolution), has been used to elucidate the architectural changes in a sequ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-oriented COBOL recycling

    Publication Year: 1996, Page(s):169 - 178
    Cited by:  Papers (34)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    A tool supported process for extracting objects from existing COBOL programs is described. The process is based on human interaction to select objects coupled with automated slicing techniques to identify all of the elementary operations which change the state of the object selected. The object is redefined within the framework of an object-COBOL class and the elementary operations are attached to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An overall process based on fusion to reverse engineer legacy code

    Publication Year: 1996, Page(s):179 - 188
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1048 KB)

    The fusion method for object-oriented development of systems is used for reverse engineering of legacy code. A literature survey is presented on relevant techniques available for covering most of the activities involved in conducting reverse engineering. Using these techniques, an overall process, based on the fusion method, called Fusion/RE, is presented. Fusion/RE was used to reverse engineer an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting reusable modules from legacy code: considering the issues of module granularity

    Publication Year: 1996, Page(s):189 - 196
    Cited by:  Papers (21)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    The paper describes the work of a reverse engineering project. The project is concerned with the identification of reusable modules of code from legacy systems. The authors apply a number of existing techniques and methods to large COBOL programs and attempt to integrate the methods to satisfy the needs of their industrial sponsors. They have found that the issue of module granularity is one of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Augmenting pattern-based architectural recovery with flow analysis: Mosaic-a case study

    Publication Year: 1996, Page(s):198 - 207
    Cited by:  Papers (18)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1002 KB)

    Understanding the overall organization of a software system, i.e. its software architecture, is often required during software maintenance: tools can help maintainers in managing the evolution of legacy systems, by showing them architectural information. The analysis of a medium-sized application using a pattern based architectural recovery environment is presented. The results obtained give usefu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design recovery by automated search for structural design patterns in object-oriented software

    Publication Year: 1996, Page(s):208 - 215
    Cited by:  Papers (82)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    The object-oriented design community has recently begun to collect so-called design patterns: cliches plus hints to their recommended use in software construction. The structural design patterns Adapter, Bridge, Composite, Decorator, and Proxy represent packaged problem/context/solution/properties descriptions to common problems in object-oriented design. Localizing instances of these patterns in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lessons from a domain-based reengineering effort

    Publication Year: 1996, Page(s):217 - 226
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1092 KB)

    The author presents the lessons and insights learned from a domain-centered reengineering effort. Using a method developed in a previous work, he sets about trying to understand and convert a complete legacy system from COBOL to an executable domain model. His work suggests that a domain-based approach is very promising but a number of issues need to be better understood. Among these are questions... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying enumeration types modeled with symbolic constants

    Publication Year: 1996, Page(s):227 - 236
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1040 KB)

    An important challenge in software reengineering is to encapsulate collections of related data that, due to the absence of appropriate constructs for encapsulation in legacy programming languages, may be distributed throughout the code. The encapsulation of such collections is a necessary step for reengineering a legacy system into an object-oriented design or implementation. Encapsulating a set o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.