To see the other types of publications on this topic, follow the link: Reverse engineering tools.

Dissertations / Theses on the topic 'Reverse engineering tools'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 30 dissertations / theses for your research on the topic 'Reverse engineering tools.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Duss, Alexander. "Development capability profiles of selected reverse engineering techniques." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20222.

Full text
Abstract:
Thesis (MScEng)--Stellenbosch University 2012<br>ENGLISH ABSTRACT: Reverse engineering (RE) has emerged as an important tool in the design stages of a product. The demand for better performance of hardware and software has spawned many different technologies that fall under RE. The diversity of technologies is linked to the different application areas of industry. It is critical to understand what the exact capability of each individual technology is, in order to choose the appropriate RE system. The objective of this study is to develop capability profiles of different RE technologies available, such as: Coordinate Measuring Machine, Articulated Arm (Cimcore), Non-contact scanner (GOM), and contact scanner (Renishaw). To achieve the objective, the different characteristics of each technology are measured and quantified. A capability profile can be regarded as defined criteria that represent the performance of a RE technology and in this study, is defined by quantifying the following characteristics:  Accuracy  Repeatability  Speed of Measurement  Work Envelope  User-friendliness. The significance of developing these capability profiles is so that they may be compared to one another. This is important, especially for the accuracy criterion, as each technology is manufactured by a different company, making an acceptable accuracy comparison amongst the different technologies impossible. The study also suggests an evaluation tool which will help a decision maker choose the appropriate technology for a specified objective. Guidelines are also given to potential end users of RE technologies on how they should go about acquiring the right system. On a more general level, the study contributes to research in recent trends, in the RE industry in terms of application, hardware, software and the selection of RE systems. By developing these capability profiles, the study aims to contribute to its value in academia, as well as for industry partners and potential RE end-users.<br>AFRIKAANSE OPSOMMING: RE het ontwikkel as n belangrike hulpmiddel in die ontwerp fase van ‘n produk. Die aanvraag na beter prestasie van hardeware en sagteware het gelei tot die ontwikkeling van baie verskillende tegnologie. Die diversiteit van die tegnologie gaan hand aan hand met die verskillende toepassings areas in die industrie. Dit is belangrik om die spesifieke eienskappe van elke individuele tegnologie te verstaan om die regte RE sisteem te kies. The doel van hierdie studie is om die vermoë profiele van die verskillende beskikbare RE tegnologie te ontwerp: Coordinate Measuring Machine, Articulated Arm (Cimcore), nie-kontak skandeerder (GOM) en kontak skandeerder (Renishaw). Die verskillende eienskappe van elke tegnologie word gemeet en gekwantifiseer. ‘n Vermoë profiel kan gesien word as ‘n vaste kriteria wat die prestasie van die RE tegnologie verteenwoordig en in hierdie studie word dit gedefinieer deur die volgende eienskappe:  Akkuraatheid  Herhaalbaarheid  Spoed van meeting  Meet volume  Gebruikers-vriendelikheid Die relevansie van die ontwikkeling van hierdie vermoë profiele is dat dit wedersyds vergelyk kan word. Dit is belangrik, spesifiek vir die akkuraatheids kriteria, omdat elke tegnologie by ‘n verskillende maatskappy vervaardig word. ‘n Aanvaarbare akkuraatsheid vergelyking onder die verskillende tegnologie is dus onmoontlik. Die studie stel ook ‘n evaluasie hulpmiddel voor wat die besluitnemer sal lei om die mees toepaslike tegnologie te kies vir die spesiefieke doeleindes. Verder word riglyne aan die potensiele gebruikers van RE tegnologie gegee oor hoe om te werk te gaan om die regte sisteem te kies indien die tegnologie nie in besit is nie. Op ‘n meer algemene vlak dra die studie tot navorsing by deur die nuutste tendense in toepassing, hardeware, sagteware en die keuse van RE sisteme in die RE industrie te beskryf. Deur hierdie vermoë profile te ontwikkel beoog die studie om waarde toe te voeg aan die akademie, vennote in die industrie en potensiele RE gebruikers.
APA, Harvard, Vancouver, ISO, and other styles
2

Vontela, Deepak Reddy. "Methodologies to Exploit ATPG Tools for De-camouflaging." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6597.

Full text
Abstract:
Semiconductor supply chain is increasingly getting exposed to Reverse Engineering (RE) of Intellectual Property (IP). Camouflaging of gates in integrated circuits are typically employed to hide the gate functionality to prevent reverse engineering. The functionalities of these gates cannot be found by De-layering as they don’t leave any layout clues. Adversaries perform reverse engineering by replacing the camouflaged gate with the known gate and by developing custom software to determine test patterns. These test patterns are used to analyze the outputs and to conclude the functionality of the camouflaged gate. In this thesis, we show that reverse engineering of camouflaged design can be performed by exploiting the test features of commercial/publicly available Automatic Test Pattern Generation (ATPG) tools. We also propose controllability/observability and Hamming Distance sensitivity based metric to select target gates for camouflaging. Simulations on ISCAS85 benchmarks shows that the proposed techniques can increase the reverse engineering effort significantly by camouflaging small fraction of gates.
APA, Harvard, Vancouver, ISO, and other styles
3

Bhardwaj, Yogita. "Reverse Engineering End-user Developed Web Applications into a Model-based Framework." Thesis, Virginia Tech, 2005. http://hdl.handle.net/10919/33150.

Full text
Abstract:
The main goal of this research is to facilitate end-user and expert developer collaboration in the creation of a web application. This research created a reverse engineering toolset and integrated it with Click (Component-based Lightweight Internet-application Construction Kit), an end-user web development tool. The toolset generates artifacts to facilitate collaboration between end-users and expert web developers when the end-users need to go beyond the limited capabilities of Click. By supporting smooth transition of workflow to expert web developers, we can help them in implementing advanced functionality in end-user developed web applications. The four artifacts generated include a sitemap, text documentation, a task model, and a canonical representation of the user interface. The sitemap is automatically generated to support the workflow of web developers. The text documentation of a web application is generated to document data representation and business logic. A task model, expressed using ConcurTaskTrees notation, covers the whole interaction specified by the end-user. A presentation and dialog model, represented in User Interface Markup Language (UIML), describe the user interface in a declarative language. The task model and UIML representation are created to support development of multi-platform user interfaces from an end-user web application. A formative evaluation of the usability of these models and representations with experienced web developers revealed that these representations were useful and easy to understand.<br>Master of Science
APA, Harvard, Vancouver, ISO, and other styles
4

Lucchi, Francesca <1984&gt. "Reverse Engineering tools: development and experimentation of innovative methods for physical and geometrical data integration and post-processing." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amsdottorato.unibo.it/5837/.

Full text
Abstract:
In recent years, the use of Reverse Engineering systems has got a considerable interest for a wide number of applications. Therefore, many research activities are focused on accuracy and precision of the acquired data and post processing phase improvements. In this context, this PhD Thesis deals with the definition of two novel methods for data post processing and data fusion between physical and geometrical information. In particular a technique has been defined for error definition in 3D points’ coordinates acquired by an optical triangulation laser scanner, with the aim to identify adequate correction arrays to apply under different acquisition parameters and operative conditions. Systematic error in data acquired is thus compensated, in order to increase accuracy value. Moreover, the definition of a 3D thermogram is examined. Object geometrical information and its thermal properties, coming from a thermographic inspection, are combined in order to have a temperature value for each recognizable point. Data acquired by an optical triangulation laser scanner are also used to normalize temperature values and make thermal data independent from thermal-camera point of view.<br>L’impiego di tecniche di Ingegneria Inversa si è ampiamente diffuso e consolidato negli ultimi anni, tanto che questi sistemi sono comunemente impiegati in numerose applicazioni. Pertanto, numerose attività di ricerca sono volte all’analisi del dato acquisito in termini di accuratezza e precisione ed alla definizione di tecniche innovative per il post processing. In questo panorama, l’attività di ricerca presentata in questa tesi di dottorato è rivolta alla definizione di due metodologie, l’una finalizzata a facilitare le operazioni di elaborazione del dato e l’altra a permettere un agevole data fusion tra informazioni fisiche e geometriche di uno stesso oggetto. In particolare, il primo approccio prevede l’individuazione della componente di errore nelle coordinate di punti acquisiti mediate un sistema di scansione a triangolazione ottica. Un’opportuna matrice di correzione della componente sistematica è stata individuata, a seconda delle condizioni operative e dei parametri di acquisizione del sistema. Pertanto, si è raggiunto un miglioramento delle performance del sistema in termini di incremento dell’accuratezza del dato acquisito. Il secondo tema di ricerca affrontato in questa tesi consiste nell’integrazione tra il dato geometrico proveniente da una scansione 3D e le informazioni sulla temperatura rilevata mediante un’indagine termografica. Si è così ottenuto un termogramma in 3D registrando opportunamente su ogni punto acquisito il relativo valore di temperatura. L’informazione geometrica, proveniente dalla scansione laser, è stata inoltre utilizzata per normalizzare il termogramma, rendendolo indipendente dal punto di vista della presa termografica.
APA, Harvard, Vancouver, ISO, and other styles
5

Meissner, Roy, and Marcus Kastner. "A mapping approach for configuration management tools to close the gap between two worlds and to regain trust: Or how to convert from docker to legacy tools (and vice versa)." Gesellschaft für Informatik, 2017. https://ul.qucosa.de/id/qucosa%3A32065.

Full text
Abstract:
In this paper we present the tool 'DockerConverter', an approach and a software to map a Docker configuration to various matured systems and also to reverse engineer any available Docker image in order to increase the confidence (or trust) into it. We show why a mapping approach is more promising than constructing a Domain Specific Language and why we chose a Docker image instead of the Dockerfile as the source model. Our overall goal is to enable Semantic Web research projects and especially Linked Data enterprise services to be better integrated into enterprise applications and companies.
APA, Harvard, Vancouver, ISO, and other styles
6

Magdalinos, Christos. "An information retrieval tool for reverse software engineering." Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=24025.

Full text
Abstract:
Information retrieval in large data spaces using formal, structure oriented patterns of features has many possible applications. We developed and studied a system that can be used to localize code segments in a program. The system is built using a generic and extensible object oriented framework and uses the Viterbi dynamic programming algorithm on simple Markov models to calculate a similarity measure between an abstractly described code segment and a possible instantiation of it in the program. The resulting system can be incorporated in a larger cooperative environment of CASE tools and can be used during the design recovery process to perform concept localization.
APA, Harvard, Vancouver, ISO, and other styles
7

Zayour, Iyad. "Reverse engineering: A cognitive approach, a case study and a tool." Thesis, University of Ottawa (Canada), 2002. http://hdl.handle.net/10393/6075.

Full text
Abstract:
Software maintenance (SM) for large legacy systems is a very inefficient process; on average, 70% of software costs are spent on maintenance [Swanson 89]. The inefficiency of SM has been related to the difficulty comprehending software systems; therefore program comprehension is considered to be a key bottleneck of SM. Reverse engineering tools have been used to alleviate this bottleneck with lower than expected success. We present a cognitively based approach for reverse engineering tool development. We use ideas from cognitive psychology and other disciplines to formulate the approach. We also describe a case study in which we applied the approach in a telecommunication company. The case study resulted in the development of DynaSee, a reverse engineering tool which helps software engineers analyze dynamic program information. DynaSee reads routine call traces, and provides several processing and visualization features that make the use of traces much more useful for software maintenance and program comprehension. Next, we describe and evaluate the various features of DynaSee that compress, abstract and augment traces to make them comprehensible and useful for SM tasks. Finally, based on our experience in developing DynaSee, we generalize the aspects of our findings and techniques that are based on psychology by relating them to the mainstream psychological literature and to other disciplines where similar techniques have been used.
APA, Harvard, Vancouver, ISO, and other styles
8

Marburger, André. "Reverse engineering of complex legacy telecommunication systems : [problem domain, concepts, solutions, and tool support] /." Aachen : Shaker, 2005. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=014186048&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

COUTO, RODNEI SILVA. "A META-TOOL FOR GENERATING DIAGRAMS USED IN THE REVERSE ENGINEERING OF LEGACY SYSTEMS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2009. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=14920@1.

Full text
Abstract:
A recuperação da documentação relativa à estrutura de um sistema legado visa apoiar o seu entendimento e sua manutenção. Com base em diagramas que descrevem a estrutura do sistema tal como implementado, facilita-se entender o sistema e analisar o impacto de pedidos de mudança. Este trabalho apresenta uma metaferramenta que utiliza metadados para a sua instanciação visando representações específicas. Para avaliar a metaferramenta e o processo de engenharia reversa por ela apoiado foi conduzido um estudo experimental visando a recuperação dos modelos de um sistema legado implementado em PL/SQL.<br>The recovery of the documentation of the structure of a legacy system aims at supporting its understanding and maintenance. Based on diagrams that describe the structure of the system as it was implemented, it is easier to understand the system and analyze the impact changes may have. This dissertation introduces a meta-tool that uses metadata for its instantiation aiming at specific representations. An experimental study on the recovery of models of a legacy system implemented in PL/SQL was conducted to enable the evaluation of the meta-tool and the reverse engineering process that it supports.
APA, Harvard, Vancouver, ISO, and other styles
10

Fernandes, Leonie Menco. "An investigation of the effect of a reverse engineering tool on the software maintenance effort /." Online version of thesis, 1991. http://hdl.handle.net/1850/11165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Bowman, David C. "Image Stitching and Matching Tool in the Automated Iterative Reverse Engineer (AIRE) Integrated Circuit Analysis Suite." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1533766175549951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Eads, Joshua Michael. "EtherAnnotate: a transparent malware analysis tool for integrating dynamic and static examination." Diss., Rolla, Mo. : Missouri University of Science and Technology, 2010. http://scholarsmine.mst.edu/thesis/pdf/Eads_09007dcc807a2d75.pdf.

Full text
Abstract:
Thesis (M.S.)--Missouri University of Science and Technology, 2010.<br>Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed May 4, 2010) Includes bibliographical references (p. 65-68).
APA, Harvard, Vancouver, ISO, and other styles
13

Kizito, Frank. "Development of Decision Support Tools for Urban Water Supply Management in Uganda." Licentiate thesis, Stockholm : Mark- och vattenteknik, Land and Water Resource Engineering, Kungliga Tekniska högskolan, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Singh, Neeta S. "An automatic code generation tool for partitioned software in distributed computing." [Tampa, Fla.] : University of South Florida, 2005. http://purl.fcla.edu/fcla/etd/SFE0001129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Slavica, Aleksić. "Metode transformacija šema baza podataka u obezbeđenju reinženjeringa informacionih sistema." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2013. http://www.cris.uns.ac.rs/record.jsf?recordId=85599&source=NDLTD&language=en.

Full text
Abstract:
Cilj istraživanja realizovanih u ovom radu, bio je je da se formalno opišu mogući pristupi transformacijama različitih opisa baza podataka iz jednog modela podataka u drugi i praktično provere kroz njihovu implementaciju u okviru jednog CASE alata, namenjenog projektovanju informacionih sistema i baza podataka. U skladu sa postavljenim ciljem definisan je metodološki pristup i softversko okruženje IIS*Ree koje omogućava visok nivo automatizacije procesa reinženjeringa informacionih sistema. Okruženje IIS*Ree, zasnovano na MDSD principima, kao krajnji rezultat generiše šemu baze podataka u izabranom ciljnom, konceptualnom ili implementacionom modelu podataka, kao i prototip aplikacije.<br>The goal of the research presented in this paper is to formally specify approaches to transformation of database specifications between different data models. The transformations are then to be implemented and tested using a CASE tool for modelling information systems and databases. Following this goal, a methodological approach is defined together with a software named IIS*Ree that provides a high level of automation of the information system reengineering process. The IIS*Ree software, developed in accordance to MDSD principles, generates database schemas specified in a target, conceptual or implementation data model, as well as application prototypes.
APA, Harvard, Vancouver, ISO, and other styles
16

Aguilar, Johansson Ida, and Andrea Runstrand. "Obstacles in the textile upcycling chain, a case study of the communication between small-scaled upcycling actors and their processes." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-23802.

Full text
Abstract:
Upcycling of textiles is a well-known method to remake worn textiles and decrease the environmental impact coming from the textile industry. Many fast fashion companies have tried to implement upcycling in their own textile value chains to become more circular. Although the effort is good in theory, there is more to be done to get better efficiency when it comes to upcycling textile fashion products. The purpose of this report was to study the obstacles in the textile upcycling chain for small-scaled actors that are engaged in design driven upcycling. This report partly investigates a specific textile value chain that is based on redesigning home textiles that comes from textile consumer waste. The report investigates the collaboration between supplier, designer and manufacturer in this specific value chain. This was by outlining their current communication and process steps. The report intends to form a ground for creation of communication tools for actors working similarly. Re:textile at Science Park Borås is a project that is working towards developing new design principles, business models and production systems in the textile industry for a better circular flow system. The cooperation with Anna Lidström, Artistic Director at Re:textile, made it possible to investigate the upcycling industry and identify the obstacles in the pre-production and production process. For collecting information for this report, data research and interviews with Swedish companies have been done. The companies that attended the interviews were from different companies in the textile upcycling industry, that were provided with as much information as possible for the analysis. The companies that attended the interviews were from different companies in the textile upcycling industry. The companies were Rave Review, XV Production, Björkåfrihet and SIPTex. The information from the interviews contributed a ground for the analysis. The semi-structured interviews varied from telephone interviews and visits. The compilations from the interviews have been carefully used to answer the reports research questions. Conclusions are presented as obstacles for the textile upcycling chain at design driven small-scaled actors. One obstacle is to cater bigger quantities of textile consumer waste that keeps the same quality. Another obstacle is the way of ensuring the quality of the product through the value chain to consumers. The third obstacle is that the communication tools are not written according to any principles which contribute to mistakes in the manufacturing process.<br>Återbruk av textilier är en väl omtalad metod för att ta vara på använda textilier för att minska på miljöpåverkan som kommer från textilindustrin. Många snabbt modeväxlande företag har försökt implementera återbruk i deras egna värdekedjor för att bli mer cirkulära. Även om tanken är god, så är det mer som behöver göras för att få en bättre effektivitet när det kommer till att återbruka textila modeprodukter. Syftet med rapporten var att undersöka hinder i den textila återbrukskedjan hos småskaliga aktörer som ägnar sig åt designdriven återbruk. Rapporten utreder dels en specifik textil värdekedja som grundar sig på att omdesigna hemtextilier som kommer ifrån textilt konsumentavfall. Rapporten utreder samarbetet mellan leverantör, designer och tillverkare i denna specifika värdekedja. Detta genom att redogöra för deras nuvarande kommunikation och processteg. Studien avser att ligga till grund för skapandet av kommunikationsverktyg för aktörer som arbetar liknande. Re:textile på Science Park Borås är en verksamhet som jobbar med att utveckla nya designmetoder, företagsmodeller samt produktionssystem i textilindustrin för ett bättre cirkulärt flödessystem. Samarbetet med Anna Lidström, Konstnärlig Ledare på Re:textile gjorde det möjligt för författarna att undersöka återbruksindustrin och identifiera bristerna i förproduktion och produktionsprocessen. För insamling av information till denna rapport har datainsamling och intervjuer med svenska företag gjorts. Företagen som ställde upp på intervju var ifrån olika verksamheter i den textila återbruksindustrin. Företagen var Rave Review, XV Production, Björkåfrihet och SIPTex. Information från intervjuerna bidrog till underlag för en analys. De semi-konstruerade intervjuerna varierade med både telefonintervju samt platsbesök. Sammanställningarna från intervjuerna har med aktsamhet använts för få svar på rapportens frågeställningar. Slutsatser redogörs som hinder för den textila återbrukskedjan hos designdrivna småskaliga aktörer. Ett hinder är bland annat att tillgodose större kvantiteter av textilt konsumentavfall som håller samma kvalitet. Ett annat hinder är att säkerställa kvalitén av produkten genom värdekedjan till kund. Ett tredje hinder är att kommunikationsverktygen inte är skrivna enligt några principer vilket bidrar till misstag i tillverkningsprocessen.
APA, Harvard, Vancouver, ISO, and other styles
17

Kienle, Holger M. "Building reverse engineering tools with software components." Thesis, 2006. http://hdl.handle.net/1828/115.

Full text
Abstract:
This dissertation explores a new approach to construct tools in the domain of reverse engineering. The approach uses already available software components -- such as off-the-shelf components and integrated development environments -- as building blocks, combining and customizing them programmatically to realize the desired functional and non-functional requirements. This approach can be characterized as component-based tool-building, as opposed to traditional tool-building, which typically develops most of the tool's functionalities from scratch. The dissertation focuses on research tools that are constructed in a university or research lab (and then possibly evaluated in an industrial setting). Often the motivation to build a research tool is a proof-of-concept implementation. Tool-building is a necessary part of research -- but it is a costly one. Traditional approaches to tool building have resulted in tools that have a high degree of custom code and exhibit little reuse. This approach offers the most flexibility, but can be costly and can result in highly idiosyncratic tools that are difficult to use. To compensate for the drawbacks of building tools from scratch, researchers have started to reuse existing functionality, leading towards an approach that leverages components as building blocks. However, this emerging approach is pursued in an ad hoc manner reminiscent of craftsmanship rather than professional engineering. The goal of this dissertation is to advance the current state of component-based tool-building towards a more disciplined, predictable approach. To achieve this goal, the dissertation first summarizes and evaluates relevant tool-building experiences and case studies, and then distills these into practical advice in the form of lessons learned, and a process framework for tool builders to follow. The dissertation uniquely combines two areas, reverse engineering and software components. The former addresses the constructed tool's application domain, the latter forms the foundation of the tool-building approach. Since this dissertation mostly focuses on tools for reverse engineering, a thorough understanding of this application domain is necessary to elicit its requirements. This is accomplished with an in-depth literature survey, which synthesizes five major requirements. The elicited requirements are used as a yardstick for the evaluation of component-based tools and the proposed process framework. There are diverse kinds of software components that can be leveraged for component-based tool building. However, not all of these components are suitable for the proposed tool-building approach. To characterize the kinds of applicable components, the dissertation introduces a taxonomy to classify components. The taxonomy also makes it possible to reason about characteristics of components and how these characteristics affect the construction of tools. This dissertation introduces a catalog of components that are applicable for the proposed tool-building approach in the reverse engineering domain. Furthermore, it provides a detailed account of several case studies that pursue component-based tool-building. Six of these case studies represent the author's own tool-building experiences. They have been performed over a period of five years within the Adoption-Centric Reverse Engineering project at the University of Victoria. These case studies, along with relevant experiences reported by other researchers, constitute a body of valuable tool-building knowledge. This knowledge base provides the foundation for this dissertation's two most important contributions. First, it distills the various experiences -- the author's as well as others -- into ten lessons learned. The lessons cover important requirements for tools as uncovered by the literature survey. Addressing these requirements promises to result in better tools that are more likely to meet the needs of tool users. Second, the dissertation proposes a suitable process framework for component-based tool development that can be instantiated by tool builders. The process framework encodes desirable properties of a process for tool-building, while providing the necessary flexibility to account for the variations of individual tool-building projects.
APA, Harvard, Vancouver, ISO, and other styles
18

Ma, Jun. "Building reverse engineering tools using Lotus notes." 2004. http://hdl.handle.net/1828/609.

Full text
Abstract:
Reverse engineering (RE) tools can help people extract and understand high level abstractions of subject systems to facilitate software maintenance. However, many of these tools suffer adoption problems in industrial practice. Based on the assumption that industrial users are more likely to accept tools built on top of their current working platforms, the ACRE project (Adoption Centric Reverse Engineering) aims to attack the adoption problem by extending some commonly used tool platforms to implement RE features, rather than writing RE applications from scratch. As part of the ACRE project, my research aims to find a solution for building RE tools on top of a particular Commercial-Off-The-Shelf (COTS) host product-Lotus NotesIDomino and validating feasibility of this approach. My hypothesis is that it is practical to build tools on top of Lotus NotesIDomino to provide RE functionality and to exploit selected features of the host product, such as CSCW (Computer Supported Collaborative Work) features, to facilitate RE tasks. In this thesis, I discuss the benefits and drawbacks of building tools with Lotus NotesIDomino. I propose a solution-the ACRENotes Framework consisting of three layers: Data, Control and Presentation. This framework provides a methodology for using Lotus NotesIDomino to store, manipulate and render RE data. It also offers a Notes template and reusable libraries as a starter kit. Based on this framework, I implemented the prototype application CREST (Collaborative Reverse Engineering Support Tool), which provides selected collaborative RE features. By comparing CREST with Rigi, a traditional stand-alone RE research tool, I discuss CREST'S advantages and disadvantages. Given this prototype tool and the lessons learned, I believe that building RE tools on top of the COTS product Lotus Notes/Domino is feasible and practical.
APA, Harvard, Vancouver, ISO, and other styles
19

蔡春福. "Rule-based object modeling analysis & reverse engineering tools." Thesis, 1992. http://ndltd.ncl.edu.tw/handle/21654424618866192236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Myers, Del. "Improving the scalability of tools incorporating sequence diagram visualizations of large execution traces." Thesis, 2011. http://hdl.handle.net/1828/3444.

Full text
Abstract:
Sequence diagrams are a popular way to visualize dynamic software execution traces. However, they tend to be extremely large, causing significant scalability problems. Not only is it difficult from a technical perspective to build interactive sequence diagram tools that are able to display large traces, it is also difficult for people to understand them. While cognitive support theory exists to help cope with the later problem, no work to date has described how to implement the cognitive support theory in sequence diagram tools. In this thesis, we tackle both the technical and cognitive support problems. First, we use previous research about cognitive support feature requirements to design and engineer an interactive, widget-based sequence diagram visualization. After implementing the visualization, we use benchmarks to test its scalability and ensure that it is efficient enough to be used in realistic applications. Then, we present two novel approaches for reducing the cognitive overhead required to understand large sequence diagrams. The first approach is to compact sequence diagrams using loops found in source code. We present an algorithm that is able to compact diagrams by up to 80%. The second approach is called the trace-focused user interface which uses software reconnaissance to create a degree-of-interest model to help users focus on particular software features and navigate to portions of the sequence diagram that are related to those features. We present a small user study that indicates the viability of the trace-focused user interface. Finally, we present the results of a small survey that indicates that users of the software find the loop compaction and the trace-focused user interface both useful.<br>Graduate
APA, Harvard, Vancouver, ISO, and other styles
21

Rosca, Dionisie. "A systematic comparison of roundtrip software engineering approaches." Master's thesis, 2019. http://hdl.handle.net/10071/20305.

Full text
Abstract:
Model-based software engineering contemplates several software development approaches in which models play an important role. One such approach is round-trip engineering. Very briefly, round-trip engineering is code generation from models, and models are updated whenever a code change occurs. The objective of this dissertation is to benchmark the comparative analysis of the round-trip engineering capability of the UML, Papyrus, Modelio and Visual Paradigm modeling tools. In more detailed terms, the work will focus on evaluating tools to automatically or semi-automatically support round-trip engineering processes for each selected diagram. Collaterally, this dissertation will allow us to gain insight into the current round-trip engineering landscape, establishing the state-of-the-art UML modeling tool support for this approach. Qualitative and quantitative analysis of the round-trip engineering capabilities of the tools show that the Papyrus, Modeling and Visual Paradigm tools yielded satisfactory results by applying the Reverse and Forward Engineering scenarios without changing the models and codes but applying the Round-trip engineering scenario with changes in model and code presented results with some gaps in model and code coherence. It was concluded that they arose because the semantic definition of the models was done informally. The conclusions drawn throughout the dissertation will answer the questions: How effective are current code generation tools for documenting application evolution? Where will it support the decision made? objectives and will support the recommendations of the best tools that address the round-trip engineering method.<br>A engenharia de software baseada em modelo contempla várias abordagens de desenvolvimento de software nas quais os modelos desempenham um papel importante. Uma dessas abordagens é a Round-trip engineering. Muito brevemente, a Round-trip engineering é a geração de código a partir de modelos, e os modelos são atualizado sempre que ocorre uma alteração no código. O objetivo desta dissertação é a realização de um benchmarking da análise comparativa da capacidade de Round-trip engineering das ferramentas de modelação UML, Papyrus, Modelio e Visual Paradigm. Em termos mais detalhados, o trabalho se concentrará na avaliação de ferramentas para dar suporte automático ou semiautomático a processos de Round-trip engineering (engenharia direta e engenharia reversa) para cada diagrama selecionado. Colateralmente, esta dissertação permitirá alcançar uma visão do panorama atual da Round-trip engineering, estabelecendo o estado da arte do suporte de ferramentas de modelação em UML à dita abordagem. A analise qualitativa e quantitativamente da capacidade de Round-trip engineering das ferramentas mostro que, as ferramentas Papiro, Modelagem e Paradigma Visual apresentaram resultados satisfatórios aplicando os cenários de Reverse e Forward Engineering sem alterar os modelos e códigos e com alterações, mas aplicando o cenário Round-trip engineering com alterações nos modelo e código apresentaram resultados com algumas lacunas nomeadamente na coerência dos modelos e código. Concluiu-se que as mesmas surgiram por causa da definição semântica dos modelos ser feita de forma informal. As conclusões tiradas ao longo do trabalho respondera as perguntas: Qual a eficácia das ferramentas atuais de geração de código para documentar a evolução dos aplicativos? Onde apoiará a decisão tomada? que foram definidas nos objetivos e apoiarão as recomendações das melhores ferramentas que aborda o método Round-trip engineering.
APA, Harvard, Vancouver, ISO, and other styles
22

Zwiers, David Michael. "Improving interoperability to facilitate reverse engineering tool adoption." 2004. http://hdl.handle.net/1828/405.

Full text
Abstract:
Although we cannot show a direct link between tool adoption and tool interoperability in this thesis, we have completed the first step by increasing our understanding of interoperability. This thesis shows how to use existing technology such as XML, SOAP and GXL to improve interoperability. Although the ideas behind XML are not new, XML has been used to increase interoperability between systems. While the goal is to improve interoperability, we also keep in mind other software engineering design concerns, such as ease of maintenance and scalability. To evaluate our ideas about improving interoperability, we completed a prototype, which allows us to compare our approach to other existing systems. Our prototype is a reverse engineering tool for which existing systems and requirements are readily available. Some of the more relevant requirements include tool customization, persistence, tool deployment and interoperability. These requirements were combined with the reverse engineering requirements in the design stages of development in the hope of creating a more cohesive system. In our quest to improve interoperability of reverse engineering tools, we considered three types of integration. Data integration refers to the extent to which applications can share or use each other's data. Control integration is the ability of one system to request another system to perform some action. Process integration is similar to other forms of integration in so far as it looks at how to easily move between two user processes or actions. In this thesis we compare our prototype, the ACRE Engine, with the Rigi system. The comparison focused on our understanding of interoperability. We found that the Rigi system has many data integration features-most of which stem from its proprietary data format, Rigi Standard Format (RSF). Rigi's ability to integrate control between applications is restricted to file system messages. We did find the Rigi system could complete process integration tasks effectively. In this thesis we show that the ACRE System is at least as good, and in most cases better than the existing Rigi system with respect to the three forms of interoperability mentioned above.
APA, Harvard, Vancouver, ISO, and other styles
23

Silva, João Carlos. "GUIsurfer: a tool for reverse engineering of graphical user interfaces." Doctoral thesis, 2010. http://hdl.handle.net/1822/12267.

Full text
Abstract:
Tese de doutoramento em Informática (ramo de conhecimento em Fundamentos da Computação)<br>Tools are currently available to developers that allow for fast development of user interfaces with graphical components. However, the design of interactive systems does not seem to be much improved by the use of such tools. Interfaces are often difficult to understand and use for end users. In many cases users have problems in identifying all the supported tasks of a system, or in understanding how to achieve their goals. Moreover, the code produced by such tools is difficult to understand and maintain. In the context of an ongoing effort to develop tools to support the automated analysis of interactive system designs, we investigate the applicability of reverse engineering approaches to graphical user interface (GUIS) source code. Our objective consists in developing tools to automatically extract models containing all possible GUI behaviors, from its source code. The model should specify when a particular GUI event can occur, which are the related conditions, which system actions are executed and which GUI state is generated next. We want to to be able to reason about and test this GUI model in order to analyse aspects of the original applications behavior, and the quality of the implementation. GUISURFER, a tool developed in the context of this doctoral thesis, is capable of automatically deriving and reason about graphical user interface behavioral models of applications written in Java/Swing and WxHaskell. This work is useful to enable the analysis of existing interactive applications, and also when an existing application must be ported or simply updated.<br>Os programadores já têm ao seu dispor diversas ferramentas que permitem o rápido desenvolvimento de interfaces gráficas com o utilizador (GUI). Todavia, o desenho dos sistemas interactivos não parece tirar partido destas ferramentas. Em muitos casos, os utilizadores têm problemas em identificar todas as tarefas suportadas pelo sistema, e têm dificuldades em perceber como atingir determinados objectivos. Por outro lado, o código gerado por estas ferramentas é difícil de analisar e manipular. No contexto do desenvolvimento de ferramentas para dar suporte à analise automatizada de sistemas interactivos, foram realizados estudos baseados em engenharia reversa para a extracção de modelos comportamentais de interfaces com o utilizador. O nosso objectivo consiste em desenvolver ferramentas para extrair automaticamente modelos descrevendo o comportamento de GUI. Os modelos descrevem quando um evento pode ocorrer, quais são as respectivas condições, quais são as acções executadas e qual é o estado da GUI gerado a seguir. É possível raciocinar e testar os modelos da GUI de modo a analisar aspectos relacionados com a usabilidade da aplicação e a qualidade da sua implementação. A ferramenta, com nome GUISURFER, desenvolvida no âmbito deste trabalho de doutoramento, permite extrair e testar modelos de comportamentos de interface gráficas com o utilizador escritas na linguagem Java/Swing e WxHaskell. Este trabalho é útil para analisar aplicações existentes bem como para dar apoio na manutenção de aplicações.<br>Fundação para a Ciência e a Tecnologia (FCT) - SFRH/BD/30729/2006.
APA, Harvard, Vancouver, ISO, and other styles
24

Yang, Fang. "Using Excel and PowerPoint to build a reverse engineering tool." 2003. http://hdl.handle.net/1828/406.

Full text
Abstract:
This thesis introduces a new reverse engineering tool development practice by presenting the development of PowerExcelRigi, a reverse engineering tool built by leveraging Rigi and two selected host tools, PowerPoint and Excel. PowerPoint and Excel, both components of the Microsoft Office Suite, were selected as the host tools for this project because of their large user base, excellent enduser programmability and strong visualization capabilities. The original Rigi reverse engineering tool is used as the backend data engine to make use of its graph computing capabilities. Using PowerExcelRigi, users appreciate the familiar user interface of Excel and PowerPoint and at the same time benefit from the efficiency of Rigi. A custom toolbar in Excel provides a means to perform several reverse engineering tasks. This toolbar follows the standard Office user interface design and seamlessly integrates reverse engineering tasks into the Office environment. Reverse engineering tasks implemented include reusing given program artifacts from Rigi format program fact files, analyzing the artifacts and visualization the analysis results by using Excel, and then reproducing Rigi graphs in PowerPoint. Some Rigi scripts demonstrating typical Rigi functionality have been executed entirely through the Office interface without noticeably using Rigi. Excel and Rigi use a loose, file-based data interchange method to interoperate with each other. In comparison to a new tool with a dedicated user interface, PowerExcelRigi offers users the benefit of the cognitive support derived from their familiarity with the host tool, which decreases the learning barrier to using the new tool. This approach will ... 111 help solve the low adoption problem suffered by many reverse engineering tools. At the same time, development cost is significantly reduced by reusing Rigi, Excel and Powerpoint as existing components. We believe this to be a promising direction for the development of lower-cost, more adoptable low reverse engineering tools.
APA, Harvard, Vancouver, ISO, and other styles
25

Gui, Grace Qing. "Extending a web authoring tool for web site reverse engineering." 2005. http://hdl.handle.net/1828/599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Tai, Syu Yong, and 許永泰. "A Framework for the Reverse Engineering of Cutting Tool-path Simulation." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/07445822507521945090.

Full text
Abstract:
碩士<br>大葉大學<br>車輛工程學系碩士班<br>96<br>In precision manufacturing industry, how to ensure the numeric code (NC) for machine tool processing is very important. In the traditional method, the pattern and the tool-path designed in the CAD/CAM, directly using straight lines and circular arcs to simulate the profile and generate current NC Codes. Between CAD/CAM systems and machine tools, there is a Pest-processer need to be implemented. This kind of normal technique will not guarantee the numeric code (NC) is the same as original design after manufactured on the machine tool. In this study, the main purpose is to simulate the NC codes produced for a CNC milling machine, so as to determine whether it is correct and complete before the machine tool processing. Base on the processing instructions in NC Code, the system uses wireframe to go through the process of developing a cutting path, which can prevent over-cutting in the real cutting. There are wide ranges of CNC milling machine controllers available, and this system is based on controller to various sorts as the design basis. Assume After reading the NC codes of a milling machine, the system is able to use reverse engineering to recreate and simulate the cutting path. In this study, using the concept of software engineering, a human-machine interface (HMI) system is developed. Through a 3D display to provide rotation, zoom, pan, and other functions, the system gives users full understanding of the cutting path in the milling process. In addition to provide simulation of the cutting path, it is also possible to perform NC-code editing on this system. In the process of examining the cutting path, it can immediately improve or insert NC-code instructions if necessary. Furthermore, the system provides a debug function for detecting the cutting path, which allows users to identify any error position in the cutting path, thus establish a complete simulation of the cutting path.
APA, Harvard, Vancouver, ISO, and other styles
27

Malik, Shweta. "Development of a Layout-Level Hardware Obfuscation Tool to Counter Reverse Engineering." 2015. https://scholarworks.umass.edu/masters_theses_2/238.

Full text
Abstract:
Reverse engineering of hardware IP block is a common practice for competitive purposes in the semiconductor industry. What is done with the information gathered is the deciding legal factor. Once this information gets into the hands of an attacker, it can be used to manufacture exact clones of the hardware device. In an attempt to prevent the illegal copies of the IP block from flooding the market, layout-level obfuscation based on switchable dopant is suggested for the hardware design. This approach can be integrated into the design and manufacturing flow using an obfuscation tool (ObfusTool) to obfuscate the functionality of the IP core. The ObfusTool is developed in a way to be flexible and adapt to different standard cell libraries and designs. It enables easy and accurate evaluation of the area, power and delay v/s obfuscation trades-offs across different design approaches for hardware obfuscation. The ObfusTool is linked to an obfuscation standard cell library which is based on a prototype design created with Obfuscells and 4-input NAND gate. The Obfuscell is a standard cell which is created with switchable functionality based on the assigned dopant configurations. The Obfuscell is combined with other logic gates to form a standard cell library, which can replace any number of existing gates in the IP block without altering it's functionality. A total of 160 different gates are realized using permutated combinations starting with 26 unique gate functions. This design library provide a high level of obfuscation in terms of the number of combinations an adversary has to go through increase to 2 2000 approximately based on the design under consideration. The connectivity of the design has been ignored by previous approaches, which we have addressed in this thesis. The connectivity of a design leaks important information related to inputs and outputs of a gate. We extend the basic idea of dopant-based hardware obfuscation by introducing "dummy wires". The addition of dummy wires not only obfuscates the functionality of the design but also it's connectivity. This greatly reduces the information leakage and complexity of the design increases. To an attacker the whole design appears as one big 'blob'.This also curbs the attempts of brute force attacks. The introduced obfuscation comes at a cost of area and power overhead on an average 5x, which varies across different design libraries.
APA, Harvard, Vancouver, ISO, and other styles
28

彭輝郎. "A Reverse Engineering System Integrated with Scanned Data, Complex Surface Model and NC Tool Path Generation." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/08573537402055425902.

Full text
Abstract:
碩士<br>國立中正大學<br>機械工程研究所<br>86<br>The purpose of this research is to establish a reverse engineering system that can integrate scanned data, complex surface models, and NC tool paths.   First, in terms of the CAD model construction of reverse engineering, we develop curves and surfaces that can be constructed rapidly, modified, analyzed, refit, and shaped-designed, using the digitized data points. Therefore, in this reverse engineering system, we develop unique functions that can rebuild curves and surfaces by integrating traditional curve/surface modeling capabilities with point data processing techniques.   With respect to the NC tool-path generation, a set of scanned data or multiple ones and complex surfaces reconstructed through reverse engineering, can be used to generate the machined data points and then produce the tool paths. Thus, in our system, not only multiple scanned data points, or complex surfaces alone can be used to generate tool paths, but also both scanned point data and complex surfaces can create the tool paths and complete the complex machining process. Regarding the machining process, the rough-cut and finish-cut are offered for achieving the machining process. In the finish-cut part, eight kinds of the finish-cut tool paths are outlined. In addition, gouging test is performed to give an immediate inspection whether the tool is over-cutting or not.   Finally, we also develop the function that NC-codes read in from our system can be transferred into point data able to be operated in our system through a tool path simulation. Threse point data can be rapidly reconstructed to create a CAD model by operating the above mentioned functions and so the original model will re-appear in our system. Furthermore, the CAD model can be modified and re-designed, as well as the re-arrangement of NC tool paths and then the machining process can be accomplished. Indeed, this reverse engineering system which integrates scanned data, CAD models, and NC tool paths, can meet the requitement of die and mold industries and to increase their efficiency. At last, the outcomes executed by our program and the real examples machined by CNC machines are displayed to verify the feasibility of this research.
APA, Harvard, Vancouver, ISO, and other styles
29

Bennett, Chris. "Tool features for understanding large reverse engineered sequence diagrams." Thesis, 2008. http://hdl.handle.net/1828/1004.

Full text
Abstract:
Originally devised as a notation to capture scenarios during analysis and design, sequence diagrams can also aid understanding of existing software through visualization of execution call traces. Reverse engineered sequence diagrams are typically huge and designing tools to help users cope with the size and complexity of such traces is a major problem. While preprocessing may be necessary to reduce the complexity of a sequence diagram, interactive tool support is critical to help the user explore and understand the resulting diagram. This thesis examines tool features necessary to effectively support sequence diagram exploration by reverse engineers. Features were derived from a literature survey and empirically evaluated using an exploratory user study. The tool features were further evaluated by situating them within theories of cognitive support.
APA, Harvard, Vancouver, ISO, and other styles
30

Wan, Flora. "Reverse Engineering of Content as a Task for Finding Usability Problems: An Evaluative Case Study using the Wikibreathe Tool for Online Creation of Asthma Action Plans." Thesis, 2009. http://hdl.handle.net/1807/18989.

Full text
Abstract:
After formulating the problem and reviewing relevant research literature, a study was performed that compared reverse engineering with traditional scenario-based techniques in usability evaluation. In this case study, an online tool for creating asthma action plans was created and evaluated through questionnaires and focus groups. The tool was then tested in a controlled study using both a traditional scenario-based approach and the reverse engineering method. A group of twelve users built asthma action plans using each method in a randomized order. Results concerning usability, efficiency and the types of usability problems found were reported, along with recommendations for further research in the use of reverse engineering as a method of usability evaluation.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!