2009
DOI: 10.1504/ijes.2009.027241
|View full text |Cite
|
Sign up to set email alerts
|

Program slicing across the hardware-software boundary for embedded systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…-slicing (Kraft, 2010, chapters 5 and 6) (Russell & Jacome, 2009) (Sivagurunathan et al, 1997) -clustering (Choi & Jang, 2010) (Adnan et al, 2008) -object identification (Weidl & Gall, 1998) -architecture recovery (Marburger & Westfechtel, 2010) (Canfora et al, 1993) -execution views (Arias et al, 2008; -state machine reconstruction (Shahbaz & Eschbach, 2010) (Knor et al, 1998) 7 According to FacetedDBLP, for EMSOFT 121 out of 345 articles (35%) match, and for TECS 125 out of 327 (38%) match. According to Scopus, for JSA 269 out of 1,002 (27%) and for LCTES 155 out of 230 (67%) match.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…-slicing (Kraft, 2010, chapters 5 and 6) (Russell & Jacome, 2009) (Sivagurunathan et al, 1997) -clustering (Choi & Jang, 2010) (Adnan et al, 2008) -object identification (Weidl & Gall, 1998) -architecture recovery (Marburger & Westfechtel, 2010) (Canfora et al, 1993) -execution views (Arias et al, 2008; -state machine reconstruction (Shahbaz & Eschbach, 2010) (Knor et al, 1998) 7 According to FacetedDBLP, for EMSOFT 121 out of 345 articles (35%) match, and for TECS 125 out of 327 (38%) match. According to Scopus, for JSA 269 out of 1,002 (27%) and for LCTES 155 out of 230 (67%) match.…”
Section: Literature Reviewmentioning
confidence: 99%
“…While there are many "generic" reverse engineering techniques that are applicable across a broad range of systems (e.g., slicing (Weiser, 1981)), complex embedded system have a set of characteristics that make it highly desirable to augment these "generic" techniques with more specialized ones. There are also characteristics of complex embedded systems that can require more sophisticated techniques compared to what is typically offered by mainstream tools (e.g., dedicated slicing techniques for embedded systems (Russell & Jacome, 2009;Sivagurunathan et al, 1997)). Graaf et al (2003) state that "the many available software development technologies don't take into account the specific needs of embedded-systems development .…”
Section: Introductionmentioning
confidence: 99%
“…-Darwin (van de Laar et al, 2011; - PROGRESS (Kraft et al, 2011) -E-CARES (Marburger & Herzberg, 2001) -ARES (Obbink et al, 1998) -Bylands (Bull et al, 1995) • an embedded system is used for a comparison of (generic) reverse engineering tools and techniques (Bellay & Gall, 1997) (Quante & Begel, 2011) -an industrial experience report or case study involving reverse engineering for * design/architecture recovery (Kettu et al, 2008) (Eixelsberger et al, 1998 (Ornburn & Rugaber, 1992) * high-level language recovery (Ward, 2004) (Palsberg & Wallace, 2002) * dependency graphs (Yazdanshenas & Moonen, 2011) * idiom extraction (Bruntink, 2008;Bruntink et al, 2007) • a (generic) reverse engineering method/process is applied to-or instantiated for-an embedded system as a case study (Arias et al, 2011) (Stoermer et al, 2003) (Riva, 2000;Riva et al, 2009) (Lewis & McConnell, 1996 • a technique is proposed that is specifically targeted at-or "coincidentally" suitable for-(certain kinds of) embedded systems: -slicing (Kraft, 2010, chapters 5 and 6) (Russell & Jacome, 2009) (Sivagurunathan et al, 1997) -clustering (Choi & Jang, 2010) (Adnan et al, 2008) object identification (Weidl & Gall, 1998) architecture recovery (Marburger & Westfechtel, 2010) (Bellay & Gall, 1998) (Canfora et al, 1993) -execution views (Arias et al, 2008; tracing (Kraft et al, 2010) (Marburger & Westfechtel, 2003) (Arts & Fredlund, 2002) timing simulation models (Andersson et al, 2006) (Huselius et al, 2006) (Huselius & Andersson, 2005) -state machine reconstruction…”
Section: Literature Reviewmentioning
confidence: 99%