Proceedings Eighth Working Conference on Reverse Engineering最新文献

筛选
英文 中文
Lessons learned in data reverse engineering 从数据逆向工程中学到的经验
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957838
K. H. Davis
{"title":"Lessons learned in data reverse engineering","authors":"K. H. Davis","doi":"10.1109/WCRE.2001.957838","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957838","url":null,"abstract":"Reverse engineering of data has been performed in one form or another for over twenty-five years (1976-2001 approx.). The author describe the lessons learned in data reverse engineering (DRE) as contributed in a survey of data reverse engineers. Interesting is the fact that some of the lessons learned tell us how we are doing in the process of initial database design as well as how difficult the DRE process really is. It is hoped that from these lessons learned, we can assist in the suggestion of the next steps that are needed in the DRE area and promote discussion among the DRE community.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123311740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Maximizing functional cohesion of comprehension environments by integrating user and task knowledge 通过整合用户和任务知识来最大化理解环境的功能内聚
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957820
J. Rilling
{"title":"Maximizing functional cohesion of comprehension environments by integrating user and task knowledge","authors":"J. Rilling","doi":"10.1109/WCRE.2001.957820","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957820","url":null,"abstract":"Program comprehension tools should facilitate the comprehension strategies used by programmers to achieve specific tasks. Many reverse engineering tools have been developed to derive abstract representations from existing source code and to apply a variety of analysis techniques. Yet, most of these software programs fail to provide users with the necessary guidance in choosing the appropriate methods, tools, abstraction levels and analysis techniques, and they frequently expose the user to unrelated information. The author presents a task and user-centered comprehension environment that maximizes the functional cohesion among the tools and comprehension techniques by focusing on a particular user task and its appropriate comprehension strategy. At the same time, we try to minimize the data coupling for the selected task by providing only the necessary task specific information, therefore reducing the data overload. This environment integrates user specific information with reverse engineered information to select the most appropriate comprehension strategy for a particular task.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Decompiling Java using staged encapsulation 使用分阶段封装反编译Java
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957845
J. Miecznikowski, L. Hendren
{"title":"Decompiling Java using staged encapsulation","authors":"J. Miecznikowski, L. Hendren","doi":"10.1109/WCRE.2001.957845","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957845","url":null,"abstract":"The paper presents an approach to program structuring for use in decompiling Java bytecode to Java source. The structuring approach uses three intermediate representations: (1) a list of typed, aggregated statements with an associated exception table, (2) a control flow graph, and (3) a structure encapsulation tree. The approach works in six distinct stages, with each stage focusing on a specific family of Java constructs, and each stage contributing more detail to the structure encapsulation tree. After completion of all stages the structure encapsulation tree contains enough information to allow a simple extraction of a structured Java program. The approach targets general Java bytecode including bytecode that may be the result of front-ends for languages other than Java, and also bytecode that has been produced by a bytecode optimizer. Thus, the techniques have been designed to work for bytecode that may not exhibit the typical structured patterns of bytecode produced by a standard Java compiler. The structuring techniques have been implemented as part of the Dava decompiler which has been built using the Soot framework.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125142361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Component clustering based on maximal association 基于最大关联的分量聚类
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957814
K. Sartipi, K. Kontogiannis
{"title":"Component clustering based on maximal association","authors":"K. Sartipi, K. Kontogiannis","doi":"10.1109/WCRE.2001.957814","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957814","url":null,"abstract":"Presents a supervised clustering framework for recovering the architecture of a software system. The technique measures the association between the system components (such as files) in terms of data and control flow dependencies among the groups of highly related entities that are scattered throughout the components. The application of data mining techniques allows us to extract the maximum association among the groups of entities. This association is used as a measure of closeness among the system files in order to collect them into subsystems using an optimization clustering technique. A two-phase supervised clustering process is applied to incrementally generate the clusters and control the quality of the system decomposition. In order to address the complexity, issues, the whole clustering space is decomposed into subspaces based on the association property. At each iteration, the subspaces are analyzed to determine the most eligible subspace for the next cluster, which is then followed by an optimization search to generate a new cluster.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127584257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Characterizing the informal knowledge contained in systems 描述系统中包含的非正式知识
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957821
N. Anquetil
{"title":"Characterizing the informal knowledge contained in systems","authors":"N. Anquetil","doi":"10.1109/WCRE.2001.957821","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957821","url":null,"abstract":"Program comprehension of legacy systems is a highly knowledge-intensive task. One of the goals of reverse engineering is to propose automated help to relate application domain concepts to all their implementation instances. It is generally accepted that to do so would require analyzing such documentation as identifiers or comments. However, before attempting to perform this difficult analysis, it would be useful to know precisely what information the documentation contains and if it is worth trying. In this paper, we present the results of a study of the knowledge contained in two sources of documentation for the Mosaic system. This knowledge is categorized into various domains, and the relative proportions of these domains are discussed. Among other things, the results highlight the high frequency with which application domain concepts are used, which could provide the means to identify them.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127348824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Requirements-driven software re-engineering framework 需求驱动的软件再工程框架
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957811
L. Tahvildari, K. Kontogiannis, J. Mylopoulos
{"title":"Requirements-driven software re-engineering framework","authors":"L. Tahvildari, K. Kontogiannis, J. Mylopoulos","doi":"10.1109/WCRE.2001.957811","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957811","url":null,"abstract":"Software re-engineering projects such as migrating code from one platform to another or restructuring a monolithic system into a modular architecture are popular maintenance tasks. Usually, projects of this type have to conform to hard and soft quality constraints (or non-functional requirements) such as \"the migrant system must run as fast as the original\", or \"the new system should be more maintainable than the original\". This paper proposes a framework that allows for specific design and quality requirements (performance and maintainability) of the target migrant system to be considered during the re-engineering process. Quality requirements for the migrant system can be encoded using soft-goal interdependency graphs and can be associated with specific software transformations that need to be carried out for achieving the target quality requirement. These transformations can be applied as a series of iterative and incremental steps that pertain both to the design (architecture) and source code (implementation) levels. An evaluation procedure can be used at each transformation step to determine whether specific goals have been achieved.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131446782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Simple type system for program reengineering 用于程序再造的简单类型系统
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957843
I. Guilfanov
{"title":"Simple type system for program reengineering","authors":"I. Guilfanov","doi":"10.1109/WCRE.2001.957843","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957843","url":null,"abstract":"This paper describes a type system used in a disassembler program to produce enhanced disassembly output The type system described in this paper is capable of representing C language types. It operates using the following methodology. First, the type information is collected from the standard C headers and is stored in type library files. The stored information is then used to comment and enhance the disassembly. A simple propagation algorithm for function arguments is described as an illustration of the functionality of the system. The power of the type system presented is that a decompiler can be constructed using a disassembler augmented by this system.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130563226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An approach for reverse engineering of web-based applications 一种基于web的应用程序的逆向工程方法
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957827
G. D. Lucca, M. D. Penta, G. Antoniol, G. Casazza
{"title":"An approach for reverse engineering of web-based applications","authors":"G. D. Lucca, M. D. Penta, G. Antoniol, G. Casazza","doi":"10.1109/WCRE.2001.957827","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957827","url":null,"abstract":"The new possibilities offered by WEB applications are pervasively and radically changing several areas. WEB applications, compared to WEB sites, offer substantially greater opportunities: a WEB application provides the WEB user with a means to modify the site status. WEB applications must cope with an extremely short development/evolution life cycle. Usually, they are implemented without producing any useful documentation for subsequent maintenance and evolution, thus compromising the desired high level of flexibility, maintainability, and adaptability that is de-facto necessary to compete and survive to market shakeout. This paper presents an approach inspired by the reverse engineering arena and a tool prototype supporting WEB application reverse engineering activities, to help maintain, comprehend and evolve WEB applications. The approach defines a set of abstract views, modeled using UML diagrams, organized into a hierarchy of different abstraction levels, depicting several aspects of a WEB application to facilitate its comprehension. A real world WEB application was used as case study, and information previously not available was recovered, with encouraging results.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121145388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
From an informal textual lexicon to a well-structured lexical database: an experiment in data reverse engineering 从非正式的文本词典到结构良好的词汇数据库:数据逆向工程的实验
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957816
G. Huet
{"title":"From an informal textual lexicon to a well-structured lexical database: an experiment in data reverse engineering","authors":"G. Huet","doi":"10.1109/WCRE.2001.957816","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957816","url":null,"abstract":"We present an experiment in data reverse engineering in the field of computational linguistics. We explain a methodology which preserves to a great extent the original input format, allowing parallel acquisition/updating of the data with processing at a more structured representation level. We motivate the use for such applications of Objective Caml, a functional programming language with strong static typing, parametric modules and meta-linguistic technology.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121480414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Computer security analysis through decompilation and high-level debugging 计算机安全分析,通过反编译和高级调试
Proceedings Eighth Working Conference on Reverse Engineering Pub Date : 2001-10-02 DOI: 10.1109/WCRE.2001.957846
C. Cifuentes, T. Waddington, M. Emmerik
{"title":"Computer security analysis through decompilation and high-level debugging","authors":"C. Cifuentes, T. Waddington, M. Emmerik","doi":"10.1109/WCRE.2001.957846","DOIUrl":"https://doi.org/10.1109/WCRE.2001.957846","url":null,"abstract":"The extensive use of computers and networks worldwide has raised the awareness of the need for tools and techniques to aid in computer security analysis of binary code, such as the understanding of viruses, trojans, worms, backdoors and general security flaws, in order to provide immediate solutions with or without the aid of software vendors. The paper is a proposal for a high-level debugging tool to be used by computer security experts, which will reduce the amount of time needed to solve security-related problems in executable programs. The current state of the art involves the tracing of thousands of lines of assembly code using a standard debugger. A high-level debugger would be capable of displaying a high-level representation of an executable program in the C language, hence reducing the number of lines that need to be inspected by an order of magnitude (i.e. hundreds instead of thousands of lines). Effectively, these techniques will help in reducing the amount of time needed to trace a security flaw in an executable program, as well as reducing the costs of acquiring or training skilled assembler engineers.","PeriodicalId":150878,"journal":{"name":"Proceedings Eighth Working Conference on Reverse Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133749045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信