An automated approach for supporting software reuse via reverse engineering

Author(s):  
G.C. Gannod ◽  
Yonghao Chen ◽  
B.H.C. Cheng
2008 ◽  
Vol 45 ◽  
pp. 161-176 ◽  
Author(s):  
Eduardo D. Sontag

This paper discusses a theoretical method for the “reverse engineering” of networks based solely on steady-state (and quasi-steady-state) data.


Author(s):  
Vishnu Sharma ◽  
Vijay Singh Rathore ◽  
Chandikaditya Kumawat

Software reuse can improve software quality with the reducing cost and development time. Systematic reuse plan enhances cohesion and reduces coupling for better testability and maintainability. Software reuse approach can be adopted at the highest extent if relevant software components can be easily searched, adapted and integrated into new system. Large software industries hold their own well managed component libraries containing well tested software component with the project category based classification .Access to these repositories are very limited. Software reuse is facing so many problems and still not so popular. This is due to issues of general access, efficient search and adoption of software component. This paper propose a framework which resolves all of the above issues with providing easy access to components, efficient incremental semantics based search, repository management, versioning of components.


2004 ◽  
Vol 62 (12) ◽  
pp. 1057-1063
Author(s):  
A. V. Agranovskiy ◽  
R. E. Agafonov ◽  
R. A. Khadi

Author(s):  
Jeremiah Vanderlaan ◽  
Josh Richert ◽  
James Morrison ◽  
Thomas Doyle

We are a group of engineering students, in our first year of undergraduate study. We have been selected from one thousand first year students and have competed and won the PACE competition. All engineers share a common general first year, but we have been accepted into Civil and Mechanical engineering. This project was assigned as the final project in the Design and Graphics course. The project we are tasked with, called the Cornerstone Design Project, is to first dissect a product, discover how it works, dimension each part and create a fully assembled model using CAD software (Solid Edge V20 in our case). As part of discovering how it works we must benchmark it so the device can be compared with competing products. The goal of the project is to develop a full understanding of part modeling and assembly in Solid Edge, learn proper measurement techniques, and learn the process of reverse engineering and product dissection. All of these tasks were stepping stones to help us fully understand how the device, and all its components, work.


Author(s):  
Johnatan Highlander Câmara Pereira ◽  
Yale Santos ◽  
Nícolas M. F. T. S. Araújo

Author(s):  
Raditya Faisal Waliulu ◽  
Teguh Hidayat Iskandar Alam

At this paper focus on Malicous Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successfull user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and dissambler body malware.Keyword : forensic malware, Analysis, Advance Presistent Threat, Cyberwar, dissambler


Sign in / Sign up

Export Citation Format

Share Document