2006 13th Working Conference on Reverse Engineering最新文献

筛选
英文 中文
FINT: Tool Support for Aspect Mining FINT:方面挖掘的工具支持
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.30
M. Marin, L. Moonen, A. Deursen
{"title":"FINT: Tool Support for Aspect Mining","authors":"M. Marin, L. Moonen, A. Deursen","doi":"10.1109/WCRE.2006.30","DOIUrl":"https://doi.org/10.1109/WCRE.2006.30","url":null,"abstract":"Aspect mining requires adequate tool support to locate source code elements implementing crosscutting concerns (aka seeds), to explore and understand relations describing these elements, and to manage concerns and seeds during the project's life cycle. FlNT is a tool implemented as an Eclipse plug-in that presently supports a number of techniques for the automatic identification of crosscutting concern seeds in source code. Furthermore, FlNT allows for combination of mining techniques (results), facilitates code navigation and comprehension to reason and decide about candidate-seeds, and supports seeds management and persistence","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121083825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Concept and implementation of the programming language and translator, for embedded systems, based on machine code decompilation and equivalence between source and executable code 概念和实现的编程语言和翻译器,用于嵌入式系统,基于机器码的反编译和源代码与可执行代码之间的等价
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.20
S. Ribic
{"title":"Concept and implementation of the programming language and translator, for embedded systems, based on machine code decompilation and equivalence between source and executable code","authors":"S. Ribic","doi":"10.1109/WCRE.2006.20","DOIUrl":"https://doi.org/10.1109/WCRE.2006.20","url":null,"abstract":"In this thesis it will be investigated the possibility of developing the programming language translator, heavily based on decompilation. Instead of keeping program in source code, it will be kept in native machine code, but it will be transparently visible as high level language program, with the help of the specialized editor","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128199450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Orchestrated Multi-view Software Architecture Reconstruction Environment 一个编排的多视图软件架构重构环境
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.13
K. Sartipi, N. Dezhkam, H. Safyallah
{"title":"An Orchestrated Multi-view Software Architecture Reconstruction Environment","authors":"K. Sartipi, N. Dezhkam, H. Safyallah","doi":"10.1109/WCRE.2006.13","DOIUrl":"https://doi.org/10.1109/WCRE.2006.13","url":null,"abstract":"Most approaches in reverse engineering literature generate a single view of a software system that restricts the scope of the reconstruction process. We propose an orchestrated set of techniques and a multi-view toolkit to reconstruct three views of a software system such as design, behavior, and structure. Scenarios are central in generating design and behavior views. The design view is reconstructed by transforming a number of scenarios into design diagrams using a novel scenario schema and generating an objectbase of actors and actions and their dependencies. The behavior view is represented by different sets of functions that implement different features of the software system corresponding to a set of feature-specific scenarios that are derived from the design view. Finally, the structure view is reconstructed using modules and interconnections that are resulted by growing the core functions related to the software features that are extracted during the behavior recovery. This orchestrated view reconstruction technique provides a more accurate and comprehensive means for reverse engineering of a software system than a single view reconstruction approach. As case studies we applied the proposed multi-view approach on two systems, Xfig drawing tool and Pine email system","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126709339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On the Use of Process Trails to Understand Software Development 用过程跟踪来理解软件开发
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.40
L. Cerulo
{"title":"On the Use of Process Trails to Understand Software Development","authors":"L. Cerulo","doi":"10.1109/WCRE.2006.40","DOIUrl":"https://doi.org/10.1109/WCRE.2006.40","url":null,"abstract":"Software repositories, such as version control systems (CVS) and bug-tracking systems (Bugzilla), provide useful information about software process trails left by developers during the evolution of a software project. Mining these repositories provides a way to understand software development, to support predictions about software development, and to plan various aspects of software projects. We introduce three cases in the areas of impact analysis, change request assignment, and crosscutting concern mining, that takes benefit from historical information and show that the combination of different type of analyses can improve the performance of these software engineering models","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128239356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Reverse Engineering with Logical Coupling 具有逻辑耦合的逆向工程
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.51
Marco D'Ambros, Michele Lanza
{"title":"Reverse Engineering with Logical Coupling","authors":"Marco D'Ambros, Michele Lanza","doi":"10.1109/WCRE.2006.51","DOIUrl":"https://doi.org/10.1109/WCRE.2006.51","url":null,"abstract":"Evolutionary information about software systems has proven to be a good resource to complement existing reverse engineering approaches, because it helps in giving a historical perspective of the system to be reverse engineered. Moreover, it provides additional types of information that are not present when only one version of a system is considered. Logical coupling, the implicit dependency between artifacts which changed together, is one example of such information. However, the recurrent problem is that such information comes in large amounts and must be processed to be useful for the reverse engineering of a system. In this paper we propose an approach to use logical coupling information at different levels of abstraction to detect areas in the system which may lead to maintenance problems. They represent a good starting point to decrease the coupling in the system. Our approach uses an interactive visualization technique called the Evolution Radar, which can effectively break down the amount and complexity of the logical coupling information. We present our technique in detail and apply it on a large open-source software system","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116301574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
"Cloning Considered Harmful" Considered Harmful "克隆被认为有害"被认为有害
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.1
Cory J. Kapser, Michael W. Godfrey
{"title":"\"Cloning Considered Harmful\" Considered Harmful","authors":"Cory J. Kapser, Michael W. Godfrey","doi":"10.1109/WCRE.2006.1","DOIUrl":"https://doi.org/10.1109/WCRE.2006.1","url":null,"abstract":"Current literature on the topic of duplicated (cloned) code in software systems often considers duplication harmful to the system quality and the reasons commonly cited for duplicating code often have a negative connotation. While these positions are sometimes correct, during our case studies we have found that this is not universally true, and we have found several situations where code duplication seems to be a reasonable or even beneficial design option. For example, a method of introducing experimental changes to core subsystems is to duplicate the subsystem and introduce changes there in a kind of sandbox testbed. As features mature and become stable within the experimental subsystem, they can then be introduced gradually into the stable code base. In this way risk of introducing instabilities in the stable version is minimized. This paper describes several patterns of cloning that we have encountered in our case studies and discusses the advantages and disadvantages associated with using them","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133911318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 292
Understanding Software Architectures by Visualization--An Experiment with Graphical Elements 通过可视化理解软件架构——图形元素的实验
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.54
J. Knodel, Dirk Muthig, Matthias Naab
{"title":"Understanding Software Architectures by Visualization--An Experiment with Graphical Elements","authors":"J. Knodel, Dirk Muthig, Matthias Naab","doi":"10.1109/WCRE.2006.54","DOIUrl":"https://doi.org/10.1109/WCRE.2006.54","url":null,"abstract":"The evolution and maintenance of large-scale software systems requires first an understanding of its architecture before delving into lower level details. Tools facilitating the architecture comprehension tasks by visualization provide different sets of graphical elements. We conducted a controlled experiment that exemplifies the critical role of such graphical elements when aiming at understanding the architecture. The results show that a different configuration of graphical elements influences program comprehension tasks significantly. In particular, a gain of effectiveness by 63% in basic architectural analysis tasks was achieved simply by choosing a different set of graphical elements. Based on the results we claim that significant effort should be spent on the configuration of architecture visualization tools","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134301571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Clone Detection Using Abstract Syntax Suffix Trees 使用抽象语法后缀树的克隆检测
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.18
R. Koschke, Raimar Falke, P. Frenzel
{"title":"Clone Detection Using Abstract Syntax Suffix Trees","authors":"R. Koschke, Raimar Falke, P. Frenzel","doi":"10.1109/WCRE.2006.18","DOIUrl":"https://doi.org/10.1109/WCRE.2006.18","url":null,"abstract":"Reusing software through copying and pasting is a continuous plague in software development despite the fact that it creates serious maintenance problems. Various techniques have been proposed to find duplicated redundant code (also known as software clones). A recent study has compared these techniques and shown that token-based clone detection based on suffix trees is extremely fast but yields clone candidates that are often no syntactic units. Current techniques based on abstract syntax trees-on the other hand-find syntactic clones but are considerably less efficient. This paper describes how we can make use of suffix trees to find clones in abstract syntax trees. This new approach is able to find syntactic clones in linear time and space. The paper reports the results of several large case studies in which we empirically compare the new technique to other techniques using the Bellon benchmark for clone detectors","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123606288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 366
Extracting Output Formats from Executables 从可执行文件中提取输出格式
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.29
Junghee Lim, T. Reps, B. Liblit
{"title":"Extracting Output Formats from Executables","authors":"Junghee Lim, T. Reps, B. Liblit","doi":"10.1109/WCRE.2006.29","DOIUrl":"https://doi.org/10.1109/WCRE.2006.29","url":null,"abstract":"We describe the design and implementation of FFE/x86 (File-Format Extractor for x86), an analysis tool that works on stripped executables (i.e., neither source code nor debugging information need be available) and extracts output data formats, such as file formats and network packet formats. We first construct a hierarchical finite state machine (HFSM) that over-approximates the output data format. An HFSM defines a language over the operations used to generate output data. We use value-set analysis (VSA) and aggregate structure identification (ASI) to annotate HFSMs with information that partially characterizes some of the output data values. VSA determines an over-approximation of the set of addresses and integer values that each data object can hold at each program point, and ASI analyzes memory accesses in the program to recover information about the structure of aggregates. A series of filtering operations is performed to over-approximate an HFSM with a finite-state machine, which can result in a final answer that is easier to understand. Our experiments with FFE/x86 uncovered a possible bug in the image-conversion utility png2ico","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127142564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
On Computing the Canonical Features of Software Systems 计算软件系统的规范特征
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.39
Jay Kothari, T. Denton, S. Mancoridis, A. Shokoufandeh
{"title":"On Computing the Canonical Features of Software Systems","authors":"Jay Kothari, T. Denton, S. Mancoridis, A. Shokoufandeh","doi":"10.1109/WCRE.2006.39","DOIUrl":"https://doi.org/10.1109/WCRE.2006.39","url":null,"abstract":"Software applications typically have many features that vary in their similarity. We define a measurement of similarity between pairs of features based on their underlying implementations and use this measurement to compute a set of canonical features. The canonical features set (CFS) consists of a small number of features that are as dissimilar as possible to each other, yet are most representative of the features that are not in the CFS. The members of the CFS are distinguishing features and understanding their implementation provides the engineer with an overview of the system undergoing scrutiny. The members of the CFS can also be used as cluster centroids to partition the entire set of features. Partitioning the set of features can simplify the understanding of large and complex software systems. Additionally, when a specific feature must undergo maintenance, it is helpful to know which features are most closely related to it. We demonstrate the utility of our method through the analysis of the Jext, Firefox, and Gaim software systems","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123174564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信