Proceedings of the 17th International Conference on Software Engineering - ICSE '95 1995
DOI: 10.1145/225014.225045
|View full text |Cite
|
Sign up to set email alerts
|

Reverse engineering of legacy code exposed

Abstract: Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective.There are two main reasons for this. First, it is very costly to "understand" legacy code sufficiently well to permit changes to be made safely, because reverse engineering of legacy code is intractable in the usual computational complexity sense. Second, even if legacy code could be cost-effectively reverse engineered, the ultimate objective -re-engineering code to create a system that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
2

Year Published

2000
2000
2022
2022

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 12 publications
0
9
0
2
Order By: Relevance
“…Reasoning problems arise when traditional assignment is used to copy references/pointers as so-called "shallow copies". Other papers (e.g., [Harms and Weide 1991], [Hogg et al 1992], [Weide et al 1995]) have already examined the many problems this causes. Indeed, the traditional assignment operator is the only data movement approach where support for modular reasoning is an issue, because it alone introduces aliased references on its own.…”
Section: Analysis Results and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Reasoning problems arise when traditional assignment is used to copy references/pointers as so-called "shallow copies". Other papers (e.g., [Harms and Weide 1991], [Hogg et al 1992], [Weide et al 1995]) have already examined the many problems this causes. Indeed, the traditional assignment operator is the only data movement approach where support for modular reasoning is an issue, because it alone introduces aliased references on its own.…”
Section: Analysis Results and Discussionmentioning
confidence: 99%
“…Any scalable engineering discipline must be able to verify component properties in isolation without having them "break" when the component is subject to composition. We consider less complication to be better because this foundation is required for any scalable software engineering discipline [Weide et al 1995]. …”
Section: Ref-to-b)mentioning
confidence: 99%
“…Post-link optimizers, such as FDPR [4] by IBM or ALTO [5], are used to disassemble a compiled binary executable and recompile it into a more optimized form in order to produce a faster executable. Other works target decompilation of obfuscated binaries [6,7].…”
Section: Related Workmentioning
confidence: 99%
“…3) This approach supports modular (i.e., component-wise) reasoning [18,21,24] about system behavior, since all pointers are hidden "under the hood" and there is no aliasing in any of the software we wrote except that which is carefully controlled inside this component's implementation [3,19].…”
Section: Dynamically Linked Structures Are Layeredmentioning
confidence: 99%