Reverse engineering models of software interfaces

نویسندگان

چکیده

Cyber-physical systems consist of many hardware and software components. Over the lifetime these their components are often replaced or updated. To avoid integration problems, formal specifications component interface behavior crucial. Such a specification captures not only set provided operations but also order using them constraints on timing behavior. Usually expressed in terms state machine. For new such can be derived from requirements. However, for legacy descriptions usually available. So they have to reverse engineered existing event logs source code. This costs lot time does scale very well. improve efficiency this process, we present passive learning technique models inspired by process mining techniques. The approach is based representing causal relations between events an log information as timed-causal graph. graph further processed eventually transformed into machine constraints. Compared other approaches literature which focus general problem inferring state-based behavior, exploit patterns client-server interactions logs.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reverse Engineering of User Interfaces

A method for reverse engineering user interfaces based on their structural and behavioural representations is presented. The interface structure is represented using an object oriented approach while interface behaviour is described using Milner's process algebra (CCS). A speciication language for user interfaces has been designed for the multiple purposes of serving as a target language for th...

متن کامل

Software Reverse Engineering

This paper presents lessons learned from an experiment to reverse engineer a program. A reverse engineering process was used as part of a project to develop an Ada implementation of a Fortran program and upgrade the existing documentation. To accomplish this, design information was extracted from the Fortran source code and entered into a software development environment. The extracted design i...

متن کامل

Software Reverse Engineering

While reverse engineering probably started with the analysis of hardware, today it plays a significant role in the software world. We discuss some of its uses and explain security related issues like malicious software and software piracy. It is shown how tools such as disassemblers and decompilers can help in this process, and why it is difficult to completely protect software from being rever...

متن کامل

Software reverse engineering

Introduction Reverse engineering aims at obtaining high level representations of programs. Reverse engineers typically start with a low level representation of a system (such as binaries, plain source code, or execution traces), and try to distill more abstract representations from these (such as, for the examples just given, source code, architectural views, or use cases, respectively). Revers...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Science and Information Systems

سال: 2021

ISSN: ['1820-0214', '2406-1018']

DOI: https://doi.org/10.2298/csis200131013b