scholarly journals Reverse Engineering Application Instruments and Code Reliability: A Comparative Study of Tools

2021 ◽  
Author(s):  
Manaqib Ahmad Zeeshan ◽  
Salman Sagheer Waris

Based on different scenarios (professional guidelines) practice of Software Reverse Engineering (SRE) is used to analyse the combined instructions system to extract information regarding design and implementation of either part of, or the whole software application. These business rules are implemented in the form of a line code whereas actual source code is hidden and only gets the binary form of the code. Technologies that used for reverse engineering are CVF, V7, CFC, 14D, RTR, B#. These instruments are used for a better understanding of the program algorithm, logic, and program specifics in windows API functions, programming assembler language, network interaction principle. The tools that are discussed will not disturb the code consistency and basic structure of software. Present research shows a comparative analysis of various tools to establish which reverse engineering tool is better based on what characteristics.

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 187326-187342
Author(s):  
Asma'a Mahfoud Hezam Al-Hakimi ◽  
Abu Bakar Md Sultan ◽  
Abdul Azim Abdul Ghani ◽  
Norhayati Mohd Ali ◽  
Novia Indriaty Admodisastro

2004 ◽  
Vol 62 (12) ◽  
pp. 1057-1063
Author(s):  
A. V. Agranovskiy ◽  
R. E. Agafonov ◽  
R. A. Khadi

Author(s):  
Jai Menon ◽  
Ranjit Desai ◽  
Jay Buckey

Abstract This paper extends the “cross-sectional” approach for reverse engineering, used abundantly in biomedical applications, to the mechanical domain. We propose a combination of “projective” and cross-sectional algorithms for handling physical artifacts with complex topology and geometry. In addition, the paper introduces the concept of constraint-based reverse engineering, where the constraint parameters could include one or more of the following: time, storage (memory, disk-space), network bandwidth, Quality of Service (output-resolution), and so forth. We describe a specific reverse-engineering application which uses ultrasound (tilt-echo) imaging to reverse engineer spatial enumeration (volume) representations from cross-sectional data. The constraint here is time, and we summarize how our implementation can satisfy real-time reconstruction for distribution of the volume data on the internet. We present results that show volume representations computed from static objects. Since the algorithms are tuned to satisfy time constraints, this method is extendable to reverse engineer temporally-varying (elastic) objects. The current reverse engineering processing time is constrained by the data-acquisition (tilt-echo imaging) process, and the entire reverse engineering pipeline has been optimized to compute incremental volume representations in the order of 3 seconds on a network of four processors.


2012 ◽  
Vol 263-266 ◽  
pp. 1961-1968
Author(s):  
Yong Chao Song ◽  
Bu Dan Wu ◽  
Jun Liang Chen

According to the feature of the JBPM workflow system development, the target code generated is determined by analyzing the process of JBPM workflow development and the architecture of J2EE. The code generation tool generates code by parsing the static form source code and loading the code generation template. The code generation tool greatly shortens the JBPM workflow system development cycle and reduces the cost of software development which has the good practicality and scalability.


Author(s):  
Mizael S. Falheiro ◽  
Laurivan S. Diniz ◽  
Jose C. Lima ◽  
Hossein R. Najafabadi ◽  
Tiago G. Goto ◽  
...  

Author(s):  
Adam Knee

Adam Knee continues this discussion of the action/adventure genre in Chapter Seven, "Training the Body Politic: Networked Masculinity and the 'War on Terror' in Hollywood Film", offering a detailed analysis of the representation of masculinity and agency in two Hollywood films, Unstoppable (2010) and Source Code (2011), which exhibit striking similarities at a range of levels, from their narratives to deeper structures of gendered character function, theme, and geo-political perspective that, he contends, are a manifestation of distinctly post-9/11 American concerns. Like Vincent M. Gaine's chapter on James Bond, Knee analyses both the variations inherent in the genre in the wake of 9/11 and the consistencies of the parameters of American mainstream film, and, more specifically, a developing conceptualization of modes of disciplined masculinity necessitated by the nation’s 'War on Terror' narrative. Knee then concludes with a comparative analysis of a pre-9/11 film and its post-9/11 remake in which these parameters are brought to the fore: the original Paul Verhoeven RoboCop (1987) and RoboCop (2014) directed by José Padilha.


Author(s):  
Brendan Cleary ◽  
Christoph Treude ◽  
Fernando Figueira Filho ◽  
Margaret-Anne Storey ◽  
Martin Salois

Author(s):  
Minh Ngoc Ngo

Due to the need to reengineer and migrating aging software and legacy systems, reverse engineering has started to receive some attention. It has now been established as an area in software engineering to understand the software structure, to recover or extract design and features from programs mainly from source code. The inference of design and feature from codes has close similarity with data mining that extracts and infers information from data. In view of their similarity, reverse engineering from program codes can be called as program mining. Traditionally, the latter has been mainly based on invariant properties and heuristics rules. Recently, empirical properties have been introduced to augment the existing methods. This article summarizes some of the work in this area.


Sign in / Sign up

Export Citation Format

Share Document