نتایج جستجو برای: reverse engineering

تعداد نتایج: 364512  

Journal: :Journal of Software Maintenance 1996
Kaisa Sere Marina A. Waldén

Recently, formal approaches to reverse engineering have received considerable attention as a means of creating correct high level specifications. We show how a formal approach to reverse engineering can be applied when constructing distributed systems, eg. if we want to reuse an existing algorithm, but in a different environment, or develop a new distributed algorithm that is somehow similar to...

2012
Foad Hamidi Melanie Baljko

Scanning or soft keyboards are alternatives to physical computer keyboards that allow users with motor disabilities to compose text and control the computer using a small number of input actions. In this paper, we present the reverse Huffman algorithm (RHA), a novel Information Theoretic method that extracts a representative latent probability distribution from a given scanning keyboard design....

2003
John Aycock David Pereira Georges Jodoin

One of the recurring topics in the Python community is how to make Python programs run faster. Typically, a set of solutions is proposed which include: adding static type inference; somehow compiling programs into native code; translating Python programs into Parrot/Lisp/.net code; applying research results from dynamically-typed language implementation. Progress has been made on some of these,...

1995
Srinivas Palthepu Gordon McCalla Jim Greer

Reverse Engineering is the process of reconstructing high-level design information from program code 3]. Reverse engineering in traditional engineering disciplines is an extraneous activity but in the eld of software engineering it is an integral part of software maintenance. A maintainer needs to understand the code in terms of which part of the code is implementing which of the domain functio...

2001
Jürgen Schönwälder Andreas Müller

The Internet-standard management protocol SNMP manipulates data structures that are defined in MIB modules. A large number of MIB modules has been defined over the last decade. Some of them are rather complex and full of technical details, which makes it hard to understand them. Furthermore, the limitations of the current data definition language make it impossible to formally express the conce...

2001
Spencer Rugaber Terry Shikano R. E. Kurt Stirewalt

Reverse engineering a program constructs a highlevel representation suitable for various software development purposes such as documentation or reengineering. Unfortunately however, there are no established guidelines to assess the adequacy of such a representation. We propose two such criteria, completeness and accuracy, and show how they can be determined during the course of reversing the re...

1994
M P Ward

In this paper we will take a detailed look at a larger example of program analysis by transformation. We will be considering Algorithm 2.3.3.A from Knuth's \Fundamental Algorithms" Knuth (1968) (P.357) which is an algorithm for the addition of polynomials represented using four-directional links. Knuth (1974) describes this as having \a complicated structure with excessively unrestrained goto s...

2015
Fabian Weise

In this paper the different techniques of reverse engineering and hardware analysis are explained through the example of Atmel’s ATtiny13 microcontroller. Furthermore its protection against vulnerabilities is analyzed, how its fuse bit mechanism can be bypassed and a possibility to defend against such attacks on the software side. Finally, the legal regulations concerning reverse engineering of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید