Conferences related to Reverse engineering

Back to Top

2014 IEEE Frontiers in Education Conference (FIE)

The Frontiers in Education (FIE)Conference is the major international conference about educational innovations and research in engineering and computing. FIE 2014 continues a long tradition of disseminating results in these areas. It is an ideal forum for sharing ideas; learning about developments in computer science, engineering, and technology education; and interacting with colleagues in these fields.

  • 2013 IEEE Frontiers in Education Conference (FIE)

    The Frontiers in Education (FIE)Conference is the major international conference about educational innovations and research in engineering and computing. FIE 2013 continues a long tradition of disseminating results in these areas. It is an ideal forum for sharing ideas; learning about developments in computer science, engineering, and technology education; and interacting with colleagues in these fields.

  • 2012 IEEE Frontiers in Education Conference (FIE)

    The Frontiers in Education (FIE)Conference is the major international conference about educational innovations and research in engineering and computing. FIE 2012 continues a long tradition of disseminating results in these areas. It is an ideal forum for sharing ideas; learning about developments in computer science, engineering, and technology education; and interacting with colleagues in these fields.

  • 2011 Frontiers in Education Conference (FIE)

    The Frontiers in Education (FIE) Conference is the major international conference about educational innovations and research in engineering and computing. FIE 2011 continues a long tradition of disseminating results in these areas. It is an ideal forum for sharing ideas; learning about developments in computer science, engineering, and technology education; and interacting with colleagues in these fields.

  • 2010 IEEE Frontiers in Education Conference (FIE)

    (FIE) Conference is a major international conference devoted to improvements in computer science, engineering, and technology (CSET) education. FIE 2008 continues a long tradition of disseminating educational research results and innovative practices in CSET education. It is an ideal forum for sharing ideas, learning about developments in CSET education, and interacting with colleagues.

  • 2009 IEEE Frontiers in Education Conference (FIE)

    FIE is a major international conference devoted to improvements in computer science, engineering and technology (CSET) education. FIE continues a loong tradition of disseminating educational research results and innovative practices in CSET education. It is an ideal forum for sharing ideas, learning about developments in CSET education, and interacting with colleagues.

  • 2008 IEEE Frontiers in Education Conference (FIE)


2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)

The conference provides an international forum for scientists, engineers and users to exchange and share their experiences, new ideas, and latest research results on all aspects of parallel and distributed systems. Contributions are solicited in all areas of parallel and distributed systems research and applications.


2010 17th Working Conference on Reverse Engineering (WCRE)

The Working Conference on Reverse Engineering (WCRE) is the premier research conference on the theory and practice of recovering information from existing software and systems. WCRE explores innovative methods of extracting the many kinds of information that can be recovered from software, software engineering documents, and systems artifacts, and examines innovative ways of using this information in system renovation and program understanding.

  • 2009 Working Conference on Reverse Engineering (WCRE)

    Reverse engineering.

  • 2007 Working Conference on Reverse Engineering (WCRE)

    The Working Conference on Reverse Engineering (WCRE) is the premier research conference on the theory and practice of recovering information from existing software and systems. WCRE explores innovative methods of extracting the many kinds of information that can be recovered from software, software engineering documents, and systems artifacts, and examines innovative ways of using this information in system renovation and program understanding.


2010 IEEE 18th International Conference on Program Comprehension (ICPC)

ICPC is the principal venue for works in program comprehension as well as a leading venue for works in the areas of software analysis, reverse engineering, software evolution, and software visualization.

  • 2009 IEEE 17th International Conference on Program Comprehension (ICPC) (formerly IWPC)

    Program comprehension is a vital blend of software engineering activities that supports reuse, inspection, maintenance, evolution, migration, reverse engineering, and reengineering of existing software systems. ICPC is the principal venue for works in the area of program comprehension as well as a leading venue for works in the areas of software analysis, reverse engineering, software evolution, and software visualization.



Periodicals related to Reverse engineering

Back to Top

Software, IEEE

IEEE Software's mission is to build the community of leading and future software practitioners. The magazine delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change. The authority on translating software theory into practice, IEEE Software is positioned between pure research and pure practice, transferring ideas, methods, and experiences among researchers and engineers. ...


Spectrum, IEEE

IEEE Spectrum Magazine, the flagship publication of the IEEE, explores the development, applications and implications of new technologies. It anticipates trends in engineering, science, and technology, and provides a forum for understanding, discussion and leadership in these areas. IEEE Spectrum is the world's leading engineering and scientific magazine. Read by over 300,000 engineers worldwide, Spectrum provides international coverage of all ...


Technology and Society Magazine, IEEE

The impact of technology (as embodied by the fields of interest in IEEE) on society, the impact of society on the engineering profession, the history of the societal aspects of electrotechnology, and professional, social, and economic responsibility in the practice of engineering and its related technology.



Most published Xplore authors for Reverse engineering

Back to Top

Xplore Articles related to Reverse engineering

Back to Top

The Theory of Relative Dependency: Higher Coupling Concentration in Smaller Modules

A. Gunes Koru; Khaled El Emam IEEE Software, 2010

Our observations on several large-scale software products has consistently shown that smaller modules are proportionally more defect prone. These findings, challenge the common recommendations from the literature suggesting that quality assurance (QA) and quality control (QC) resources should focus on larger modules. Those recommendations are based on the unfounded assumption that a monotonically increasing linear relationship exists between module size ...


Legacy systems migration in CELLEST

E. Stroulia; M. El-Ramly; P. Sorenson; R. Penner Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium, 2000

Most research on legacy user interface migration has adopted code understanding as the means for system modeling and reverse engineering. The methodological assumption underlying the CELLEST project is that the purpose of system migration is to enable, and possibly optimize, its current uses on a new platform. This is why CELLEST uses traces of the system-user interaction to reverse engineer ...


BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling

Jiang Ming; Dinghao Wu 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2016

In many tasks of reverse engineering and binary code analysis (e.g., hybrid disassembly, resolving indirect jump, and decoupled taint analysis), the knowledge of detailed dynamic control flow can be of great value. However, the high runtime overhead beset the complete collection of dynamic control flow. The previous efforts on efficient path profiling cannot be directly applied to the obfuscated binary ...


What Hackers Learn that the Rest of Us Don't: Notes on Hacker Curriculum

Sergey Bratus IEEE Security & Privacy, 2007

To learn security skills, students and developers must be able to switch from their traditional conditioning to the attacker's way of thinking. Exposure to the hacker culture through hacker conferences such as Defcon and others, Phrack and similar publications, and to comprehensive collections such as Packet Storm helps provide the necessary culture slunk or "a-ha" moment and should be integral ...


Evaluation methods for Web application clustering

P. Tonella; F. Ricca; E. Pianta; C. Girardi Fifth IEEE International Workshop on Web Site Evolution, 2003. Theme: Architecture. Proceedings., 2003

Clustering of the entities composing a Web application (static and dynamic pages) can be used to support program understanding, However, several alternative options are available when a clustering technique is designed for Web applications. The entities to be clustered can be described in different ways (e.g., by their structure, by their connectivity, or by their content), different similarity measures are ...


More Xplore Articles

Educational Resources on Reverse engineering

Back to Top

eLearning

The Theory of Relative Dependency: Higher Coupling Concentration in Smaller Modules

A. Gunes Koru; Khaled El Emam IEEE Software, 2010

Our observations on several large-scale software products has consistently shown that smaller modules are proportionally more defect prone. These findings, challenge the common recommendations from the literature suggesting that quality assurance (QA) and quality control (QC) resources should focus on larger modules. Those recommendations are based on the unfounded assumption that a monotonically increasing linear relationship exists between module size ...


Legacy systems migration in CELLEST

E. Stroulia; M. El-Ramly; P. Sorenson; R. Penner Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium, 2000

Most research on legacy user interface migration has adopted code understanding as the means for system modeling and reverse engineering. The methodological assumption underlying the CELLEST project is that the purpose of system migration is to enable, and possibly optimize, its current uses on a new platform. This is why CELLEST uses traces of the system-user interaction to reverse engineer ...


BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling

Jiang Ming; Dinghao Wu 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2016

In many tasks of reverse engineering and binary code analysis (e.g., hybrid disassembly, resolving indirect jump, and decoupled taint analysis), the knowledge of detailed dynamic control flow can be of great value. However, the high runtime overhead beset the complete collection of dynamic control flow. The previous efforts on efficient path profiling cannot be directly applied to the obfuscated binary ...


What Hackers Learn that the Rest of Us Don't: Notes on Hacker Curriculum

Sergey Bratus IEEE Security & Privacy, 2007

To learn security skills, students and developers must be able to switch from their traditional conditioning to the attacker's way of thinking. Exposure to the hacker culture through hacker conferences such as Defcon and others, Phrack and similar publications, and to comprehensive collections such as Packet Storm helps provide the necessary culture slunk or "a-ha" moment and should be integral ...


Evaluation methods for Web application clustering

P. Tonella; F. Ricca; E. Pianta; C. Girardi Fifth IEEE International Workshop on Web Site Evolution, 2003. Theme: Architecture. Proceedings., 2003

Clustering of the entities composing a Web application (static and dynamic pages) can be used to support program understanding, However, several alternative options are available when a clustering technique is designed for Web applications. The entities to be clustered can be described in different ways (e.g., by their structure, by their connectivity, or by their content), different similarity measures are ...


More eLearning Resources

IEEE.tv Videos

Lloyd Watts: Reverse-Engineering the Human Auditory Pathway -WCCI 2012 Plenary talk
Micro-Apps 2013: Rapid Simulation of Large Phased Array T/R Module Networks
2014 Medal in Power Engineering
EMBC 2011-Symposium on BME Education-PT II
Lionel Briand on Software Engineering
EMBC 2011-Keynote Lecture-Engineering Drug Dosing in Dynamic Biological Systems - David J. Balaban
EMBC 2011-Symposium on BME Education-PT I
IMS 2015: Luca Pierantoni - A New Challenge in Computational Engineering
Enjoy the Ride: An Engineers Plan to Make Engineering Hip
IMS 2012 Special Sessions: A Retrospective of Field Theory in Microwave Engineering - Magdalena Salazar Palma
IMS 2012 Special Sessions: Globalization of Engineering Education and Research: Opportunities and Challenges - Ron Hira
IMS 2012 Special Sessions: Globalization of Engineering Education and Research: Opportunities and Challenges - Peter Staecker
IMS 2012 Special Sessions: A Retrospective of Field Theory in Microwave Engineering - David M. Pozar
IMS 2012 Special Sessions: Globalization of Engineering Education and Research: Opportunities and Challenges - John M. Grandin
The Emerging Field of Biomedical Engineering
Engineering For Social Good
I Change the World: Jessica's Inspiration
EMBC 2011-Workshop-Nanobiomaterials-Rohin K. Iyer
IMS 2012 Special Sessions: Globalization of Engineering Education and Research: Opportunities and Challenges - Alan Cheville
IMS 2012 Special Sessions: Globalization of Engineering Education and Research: Opportunities and Challenges - Sigrid Berka

IEEE-USA E-Books

  • Modeling Interoperable Objects

    Until recently, information systems have been designed around different business functions, such as accounts payable and inventory control. Object- oriented modeling, in contrast, structures systems around the data--the objects--that make up the various business functions. Because information about a particular function is limited to one place--to the object--the system is shielded from the effects of change. Object-oriented modeling also promotes better understanding of requirements, clear designs, and more easily maintainable systems.This book focuses on recent developments in representational and processing aspects of complex data-intensive applications. The chapters cover "hot" topics such as application behavior and consistency, reverse engineering, interoperability and collaboration between objects, and work-flow modeling. Each chapter contains a review of its subject, followed by object-oriented modeling techniques and methodologies that can be applied to real-life applications.Contributors : F. Casati, S. Ceri, R. Cicchetti, L. M. L. Delcambre, E. F. Ecklund, D. W. Embley, G. Engels, J. M. Gagnon, R. Godin, M. Gogolla, L. Groenewegen, G. S. Jensen, G. Kappel, B. J. Krÿmer, S. W. Liddle, R. Missaoui, M. Norrie, M. P. Papazoglou, C. Parent, B. Perniei, P. Poncelet, G. Pozzi, M. Schreft, R. T. Snodgrass, S. Spaccapietra, M. Stumptner, M. Teisseire, W. J. van den Heuevel, S. N. Woodfield.

  • Appendix D: Use of CASE Tools

    This appendix contains sections titled: Logical Data Modeling Physical Data Modeling (for the relational model) Dimensional Data Modeling Calculating Physical Storage Space Domain Dictionary Forward Engineering Backward or Reverse Engineering

  • Behavioral Modeling

    Until recently, information systems have been designed around different business functions, such as accounts payable and inventory control. Object- oriented modeling, in contrast, structures systems around the data--the objects--that make up the various business functions. Because information about a particular function is limited to one place--to the object--the system is shielded from the effects of change. Object-oriented modeling also promotes better understanding of requirements, clear designs, and more easily maintainable systems.This book focuses on recent developments in representational and processing aspects of complex data-intensive applications. The chapters cover "hot" topics such as application behavior and consistency, reverse engineering, interoperability and collaboration between objects, and work-flow modeling. Each chapter contains a review of its subject, followed by object-oriented modeling techniques and methodologies that can be applied to real-life applications.Contributors : F. Casati, S. Ceri, R. Cicchetti, L. M. L. Delcambre, E. F. Ecklund, D. W. Embley, G. Engels, J. M. Gagnon, R. Godin, M. Gogolla, L. Groenewegen, G. S. Jensen, G. Kappel, B. J. Krÿmer, S. W. Liddle, R. Missaoui, M. Norrie, M. P. Papazoglou, C. Parent, B. Perniei, P. Poncelet, G. Pozzi, M. Schreft, R. T. Snodgrass, S. Spaccapietra, M. Stumptner, M. Teisseire, W. J. van den Heuevel, S. N. Woodfield.

  • The Quantified Self: Reverse Engineering

    This chapter contains sections titled: Notes

  • Modeling Object Collaborations

    Until recently, information systems have been designed around different business functions, such as accounts payable and inventory control. Object- oriented modeling, in contrast, structures systems around the data--the objects--that make up the various business functions. Because information about a particular function is limited to one place--to the object--the system is shielded from the effects of change. Object-oriented modeling also promotes better understanding of requirements, clear designs, and more easily maintainable systems.This book focuses on recent developments in representational and processing aspects of complex data-intensive applications. The chapters cover "hot" topics such as application behavior and consistency, reverse engineering, interoperability and collaboration between objects, and work-flow modeling. Each chapter contains a review of its subject, followed by object-oriented modeling techniques and methodologies that can be applied to real-life applications.Contributors : F. Casati, S. Ceri, R. Cicchetti, L. M. L. Delcambre, E. F. Ecklund, D. W. Embley, G. Engels, J. M. Gagnon, R. Godin, M. Gogolla, L. Groenewegen, G. S. Jensen, G. Kappel, B. J. Krÿmer, S. W. Liddle, R. Missaoui, M. Norrie, M. P. Papazoglou, C. Parent, B. Perniei, P. Poncelet, G. Pozzi, M. Schreft, R. T. Snodgrass, S. Spaccapietra, M. Stumptner, M. Teisseire, W. J. van den Heuevel, S. N. Woodfield.

  • Index

    Until recently, information systems have been designed around different business functions, such as accounts payable and inventory control. Object- oriented modeling, in contrast, structures systems around the data--the objects--that make up the various business functions. Because information about a particular function is limited to one place--to the object--the system is shielded from the effects of change. Object-oriented modeling also promotes better understanding of requirements, clear designs, and more easily maintainable systems.This book focuses on recent developments in representational and processing aspects of complex data-intensive applications. The chapters cover "hot" topics such as application behavior and consistency, reverse engineering, interoperability and collaboration between objects, and work-flow modeling. Each chapter contains a review of its subject, followed by object-oriented modeling techniques and methodologies that can be applied to real-life applications.Contributors : F. Casati, S. Ceri, R. Cicchetti, L. M. L. Delcambre, E. F. Ecklund, D. W. Embley, G. Engels, J. M. Gagnon, R. Godin, M. Gogolla, L. Groenewegen, G. S. Jensen, G. Kappel, B. J. Krÿmer, S. W. Liddle, R. Missaoui, M. Norrie, M. P. Papazoglou, C. Parent, B. Perniei, P. Poncelet, G. Pozzi, M. Schreft, R. T. Snodgrass, S. Spaccapietra, M. Stumptner, M. Teisseire, W. J. van den Heuevel, S. N. Woodfield.

  • The Meaning of 3D Shape and Some Techniques to Extract it

    This chapter contains sections titled: Introduction to 3D Objects Geometry and Semantics: Recipe with Some Open Questions Why are Shape Semantics so Urgently Needed? Description of Geometrical Knowledge Reverse Engineering as Inverse Problem Examples of 3 D Information Extraction Conclusion

  • Temporal and Dynamic Modeling

    Until recently, information systems have been designed around different business functions, such as accounts payable and inventory control. Object- oriented modeling, in contrast, structures systems around the data--the objects--that make up the various business functions. Because information about a particular function is limited to one place--to the object--the system is shielded from the effects of change. Object-oriented modeling also promotes better understanding of requirements, clear designs, and more easily maintainable systems.This book focuses on recent developments in representational and processing aspects of complex data-intensive applications. The chapters cover "hot" topics such as application behavior and consistency, reverse engineering, interoperability and collaboration between objects, and work-flow modeling. Each chapter contains a review of its subject, followed by object-oriented modeling techniques and methodologies that can be applied to real-life applications.Contributors : F. Casati, S. Ceri, R. Cicchetti, L. M. L. Delcambre, E. F. Ecklund, D. W. Embley, G. Engels, J. M. Gagnon, R. Godin, M. Gogolla, L. Groenewegen, G. S. Jensen, G. Kappel, B. J. Krÿmer, S. W. Liddle, R. Missaoui, M. Norrie, M. P. Papazoglou, C. Parent, B. Perniei, P. Poncelet, G. Pozzi, M. Schreft, R. T. Snodgrass, S. Spaccapietra, M. Stumptner, M. Teisseire, W. J. van den Heuevel, S. N. Woodfield.

  • Beyond Modeling

    Until recently, information systems have been designed around different business functions, such as accounts payable and inventory control. Object- oriented modeling, in contrast, structures systems around the data--the objects--that make up the various business functions. Because information about a particular function is limited to one place--to the object--the system is shielded from the effects of change. Object-oriented modeling also promotes better understanding of requirements, clear designs, and more easily maintainable systems.This book focuses on recent developments in representational and processing aspects of complex data-intensive applications. The chapters cover "hot" topics such as application behavior and consistency, reverse engineering, interoperability and collaboration between objects, and work-flow modeling. Each chapter contains a review of its subject, followed by object-oriented modeling techniques and methodologies that can be applied to real-life applications.Contributors : F. Casati, S. Ceri, R. Cicchetti, L. M. L. Delcambre, E. F. Ecklund, D. W. Embley, G. Engels, J. M. Gagnon, R. Godin, M. Gogolla, L. Groenewegen, G. S. Jensen, G. Kappel, B. J. Krÿmer, S. W. Liddle, R. Missaoui, M. Norrie, M. P. Papazoglou, C. Parent, B. Perniei, P. Poncelet, G. Pozzi, M. Schreft, R. T. Snodgrass, S. Spaccapietra, M. Stumptner, M. Teisseire, W. J. van den Heuevel, S. N. Woodfield.

  • The Challenges of Systems Biology

    This chapter contains sections titled: 1 Genomics, Gene Expression, and Next- Generation Sequencing, 2 Metabolic Network Reconstruction, 3 Computational Models of Gene Translation, 4 Reverse Engineering of Cellular Networks, 5 Outlook, Note, References



Standards related to Reverse engineering

Back to Top

Standard for Information Technology - Systems Design - Software Design Descriptions

This standard describes software designs and establishes the information content and organization of a software design description (SDD). An SDD is a representation of a software design to be used for recording design information and communicating that design information to key design stakeholders. This standard is intended for use in design situations in which an explicit software design description is ...



Jobs related to Reverse engineering

Back to Top