Reverse Engineering Meets Data Analysis

نویسندگان

  • Periklis Andritsos
  • Renée J. Miller
چکیده

We demonstrate how the data management techniques known as On{Line Analytical Processing, or OLAP, can be used to enhance the sophistication and range of software reverse engineering tools. This is the rst comprehensive examination of the similarities and diierences in these tasks both in how OLAP techniques meet (or fail to meet) the needs of reverse engineering and in how reverse engineering can be recast using data analysis. To permit the seamless integration of these technologies , we extend a multidimensional data model to manage dynamically changing dimensions (over which data can be aggregated). We use a case study of the Apache web server to show how our solutions permit an integrated view of data ranging from low level program analysis information to abstract, aggregate information. These high{level abstractions may be provided either by humans (perhaps using a visualization tool) or directly from reverse engineering tools or data mining techniques.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A 3-D point sets registration method in reverse engineering

When acquiring the surface data of the sample part, it is not easy to get the full data on one scan due to the configuration or topology of the part. In addition, some special parts have special assembly request, for example the joint surface smooth and the boundary share. The process usually requires multiple scans for an assembly model. Some identical points have different coordinate data bec...

متن کامل

When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice

In the past years, various electronic access control systems have been found to be insecure. In consequence, attacks have emerged that permit unauthorized access to secured objects. One of the few remaining, allegedly secure digital locking systems—the system 3060 manufactured and marketed by SimonsVoss—is employed in numerous objects worldwide. Following the trend to analyze the susceptibility...

متن کامل

Working with ‘Monster’ Traces: Building a Scalable, Usable Sequence Viewer

In this position paper, we survey and identify tool features that provide cognitive support for reverse engineering and program comprehension of very large reverse engineered sequence diagrams. From these features we synthesize user requirements for a sequence diagram viewer, to which we add system requirements such as memory and processing scalability. We briefly describe a pluggable sequence ...

متن کامل

Organization's performance measurement model based on the critical success factors of the reverse supply chain in airline industry with a quality gap approach

Airline industry is one of the main infrastructures for sustainable development of a country. The quality of the reverse support service will be effective in increasing the safety and health of the structures, reducing the impact of disasters and reducing costs. The aim of this study is to evaluate the performance of an organization based on the main factors of reverse supply chain with the ser...

متن کامل

A Generic Architecture for Data Flow Analysis to Support Reverse Engineering

Data flow analysis is a process for collecting run-time information about data in programs without actually executing them. In this paper, we focus at the use of data flow analysis to support program understanding and reverse engineering. Data flow analysis is beneficial for these applications since the information obtained can be used to compute relationships between data objects in programs. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001