2006 13th Working Conference on Reverse Engineering最新文献

筛选
英文 中文
Quality Assessment of Enterprise Software Systems 企业软件系统质量评估
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.46
C. Marinescu
{"title":"Quality Assessment of Enterprise Software Systems","authors":"C. Marinescu","doi":"10.1109/WCRE.2006.46","DOIUrl":"https://doi.org/10.1109/WCRE.2006.46","url":null,"abstract":"In the last years, as object-oriented software systems became more and more complex, the need of having tools that help us to understand and to assess the quality of their design has increased significantly. This applies also to enterprise applications, a novel category of software systems. Unfortunately, the existing techniques for design's understanding and quality assessment of object-oriented systems are not sufficient and sometimes not suitable when applied on enterprise applications. In the current Ph.D. we propose a new approach which increases the level of understanding and the accuracy assessment of the design of enterprise software systems","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122291763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
How Programs Represent Reality (and how they don't) 程序如何表现现实(以及它们如何不表现现实)
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.32
D. Ratiu, F. Deißenböck
{"title":"How Programs Represent Reality (and how they don't)","authors":"D. Ratiu, F. Deißenböck","doi":"10.1109/WCRE.2006.32","DOIUrl":"https://doi.org/10.1109/WCRE.2006.32","url":null,"abstract":"Programming is modeling the reality. Most of the times, the mapping between source code and the real world concepts are captured implicitly in the names of identifiers. Making these mappings explicit enables us to regard programs from a conceptual perspective and thereby to detect semantic defects such as (logical) redundancies in the implementation of concepts and improper naming of program entities. We present real world examples of these problems found in the Java standard library and establish a formal framework that allows their concise classification. Based on this framework, we present our method for recovering the mappings between the code and the real world concepts expressed as ontologies. These explicit mappings enable semi-automatic identification of the discussed defect classes","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129691417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
PODoJA: Packaging Optimizer for Downloadable Java Applications 用于可下载Java应用程序的打包优化器
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.43
T. Bodhuin
{"title":"PODoJA: Packaging Optimizer for Downloadable Java Applications","authors":"T. Bodhuin","doi":"10.1109/WCRE.2006.43","DOIUrl":"https://doi.org/10.1109/WCRE.2006.43","url":null,"abstract":"Applications are often distributed and accessible on the network for being downloaded when needed. However, the way applications are created does not usually consider the optimization of downloading time and bandwidth usage. This is a relevant problem for applications that are deployed in relatively slow networks. When the download time means cost, like usually for the GSM/GPRS communication network, applications that are packaged for reducing the average downloading time in a set of classical execution scenarios will improve the user experience. This paper presents an approach and supporting toolset for packaging a Java application as a set of jar files so that the downloading time/cost for a set of execution scenarios is minimized. The approach relies on run-time analysis performed by executing scenarios over a dynamically downloaded and traced application, and uses genetic algorithms for determining the sub-optimal packaging of classes/resources in jar files","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128012897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
QUARK: Empirical Assessment of Automaton-based Specification Miners QUARK:基于自动化的规范挖掘的经验评估
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.47
D. Lo, Siau-Cheng Khoo
{"title":"QUARK: Empirical Assessment of Automaton-based Specification Miners","authors":"D. Lo, Siau-Cheng Khoo","doi":"10.1109/WCRE.2006.47","DOIUrl":"https://doi.org/10.1109/WCRE.2006.47","url":null,"abstract":"Software is often built without specification. Tools to automatically extract specification from software are needed and many techniques have been proposed. One type of these specifications - temporal API specification - is often specified in the form of automaton. There has been much work on reverse engineering or mining software temporal specification, using dynamic analysis techniques; i.e., analysis of software program traces. Unfortunately, the issues of scalability, robustness and accuracy of these techniques have not been comprehensively addressed. In this paper, we describe QUARK (quality assurance framework) that enables assessments of the performance of a specification miner in generating temporal specification of software through traces recorded from its API interaction. QUARK requires the temporal specification produced by the miner to be expressed as an automaton. It accepts a user-defined simulator automaton and a specification miner. It produces quality assurance measures on the specification generated by the miner. Extensive experiments on 3 specification miners have been performed to demonstrate the usefulness of our proposed framework","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132143772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 116
A UML-based Approach for Abstracting Application Interfaces to REST-like Services 将应用程序接口抽象为类rest服务的基于uml的方法
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.8
Markku Laitkorpi, Johannes Koskinen, Tarja Systä
{"title":"A UML-based Approach for Abstracting Application Interfaces to REST-like Services","authors":"Markku Laitkorpi, Johannes Koskinen, Tarja Systä","doi":"10.1109/WCRE.2006.8","DOIUrl":"https://doi.org/10.1109/WCRE.2006.8","url":null,"abstract":"The REST (representational state transfer) architectural style defines a set of interface constraints that aim at retaining interoperability between systems that may evolve independently of each other. However, REST developers are currently lacking modeling tools that would help them apply interface constraints to legacy APIs when exposing them as REST-like services. We believe that REST-aware tools would implement three major steps: analyzing a legacy API, abstracting it to a canonical form with constraints in place, and generating adapter code for the abstraction. In this paper we present a model-based approach to the abstraction step of such a tool. First we discuss the role of fully profiled UML models in representing API operations. Using those models, we focus on describing how to transform an API model into a canonical interface model. As a concrete part of our work we specify how UML models are processed during these transformations. To demonstrate the applicability of our approach, we present a real world API example","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127806208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Extracting Facts from Perl Code 从Perl代码中提取事实
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.28
D. L. Moise, Kenny Wong
{"title":"Extracting Facts from Perl Code","authors":"D. L. Moise, Kenny Wong","doi":"10.1109/WCRE.2006.28","DOIUrl":"https://doi.org/10.1109/WCRE.2006.28","url":null,"abstract":"Scripting languages are popular in software development, for rapid prototyping and flexible software integration. Still, there has been relatively more effort spent on reverse engineering for traditional languages, like C, C++, and Java. Certain scripting languages, such as Perl, are notoriously difficult to understand. Consequently, reverse engineering for Perl code is very much needed. Nevertheless, the subtle constructs of the language make it challenging to develop a reliable fact extractor from scratch. Thus, we use the Perl interpreter implementation itself, since it is authoritative for the meaning of some Perl construct. An extractor component is inserted into the interpreter, to consult the internal data structures, and generate the desired facts in a static extraction technique. The facts conform to a schema that is represented in GXL and EMF XML-based formats. A case study evaluated how the extractor processed all the Perl modules provided with the Perl distribution source code","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133850949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Empirical Studies in Reverse Engineering 逆向工程的实证研究
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.25
Marco Torchiano
{"title":"Empirical Studies in Reverse Engineering","authors":"Marco Torchiano","doi":"10.1109/WCRE.2006.25","DOIUrl":"https://doi.org/10.1109/WCRE.2006.25","url":null,"abstract":"Recently several tools and techniques for the reverse engineering of existing code have been proposed and implemented but very rarely any attempt was made to empirically validate usability and usefulness in the field are uncommon. This workshop addresses this gap and offers an open discussion forum to present techniques and results relating to this topic.","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114227465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Industrial Case Study of Program Artifacts Viewed During Maintenance Tasks 在维护任务中查看程序工件的工业案例研究
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.12
Lijie Zou, Michael W. Godfrey
{"title":"An Industrial Case Study of Program Artifacts Viewed During Maintenance Tasks","authors":"Lijie Zou, Michael W. Godfrey","doi":"10.1109/WCRE.2006.12","DOIUrl":"https://doi.org/10.1109/WCRE.2006.12","url":null,"abstract":"Research on maintenance task structure modeling has so far examined only how often program artifacts are modified, and what information can be deduced from modification records. However, developers often access artifacts that they do not change, and this information is not modeled or recorded by current research systems. In this paper, we describe an exploratory industrial case study that we have conducted to investigate this issue; we found that within a given maintenance task, the software artifacts that are viewed but not changed outnumber the changed artifacts over 10% of the time. We further found that including information about which artifacts were changed and which were only viewed was key to a mature understanding of the tasks that the developers were performing. Finally, we discuss how creating a repository that captures both the viewed-only and modified artifact accesses can yield further insights into the development process, such as how developers handle interruptions and task switching in their workflow","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114651883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
An Empirical Study of Executable Concept Slice Size 可执行概念片大小的实证研究
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.11
D. Binkley, N. Gold, M. Harman, Zheng Li, Kiarash Mahdavi
{"title":"An Empirical Study of Executable Concept Slice Size","authors":"D. Binkley, N. Gold, M. Harman, Zheng Li, Kiarash Mahdavi","doi":"10.1109/WCRE.2006.11","DOIUrl":"https://doi.org/10.1109/WCRE.2006.11","url":null,"abstract":"An executable concept slice extracts from a program an executable subprogram that captures the semantics of a specified high-level concept from the program. Executable concept slicing combines the executability of program slicing, with the expressive domain level criteria of concept assignment. This paper presents results from an investigation of executable concept slice size to assess the effectiveness of executable concept slicing. The results show that the coherence of concept-based slicing criteria allows them to produce smaller executable concept slices than arbitrary criteria, providing evidence for the applicability of executable concept slicing","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115462224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP PHP内部和外部威胁敏感SQL注入漏洞分析
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.33
E. Merlo, Dominic Letarte, G. Antoniol
{"title":"Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP","authors":"E. Merlo, Dominic Letarte, G. Antoniol","doi":"10.1109/WCRE.2006.33","DOIUrl":"https://doi.org/10.1109/WCRE.2006.33","url":null,"abstract":"In general, SQL-injection attacks rely on some weak validation of textual input used to build database queries. Maliciously crafted input may threaten the confidentiality and the security policies of Web sites relying on a database to store and retrieve information. Furthermore, insiders may introduce malicious code in a Web application, code that, when triggered by some specific input, for example, would violate security policies. This paper presents an original approach based on static analysis to automatically detect statements in PHP applications that may be vulnerable to SQL-injections triggered by either malicious input (outsider threats) or malicious code (insider threats). Original flow analysis equations, that propagate and combine security levels along an inter-procedural control flow graph (CFG), are presented. The computation of security levels presents linear execution time and memory complexity","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130082271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信