2018
DOI: 10.15439/2018f64
|View full text |Cite
|
Sign up to set email alerts
|

Reverse Engineering of Legacy Software Interfaces to a Model-Based Approach

Abstract: Cyber-physical systems consist of many hardware and software components. Over the life-cycle of these systems, components are replaced or updated. To avoid integration problems, good interface descriptions are crucial for component-based development of these systems. For new components, a Domain Specific Language (DSL) called Component Modeling & Analysis (ComMA) can be used to formally define the interface of such a component in terms of its signature, state and timing behavior. Having interfaces described in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Software behavior: the aim is to move beyond the traditional structural description of software and systems and to describe the behavior in an actionable way. This is done by capturing how the building blocks affect their surround-ings, as described in (Schuts 2018). This includes static and dynamic behavior of a single interface, multiple interfaces, an entire component, multiple components, and the complete architecture.…”
Section: Expertise Teams and Roadmapsmentioning
confidence: 99%
“…Software behavior: the aim is to move beyond the traditional structural description of software and systems and to describe the behavior in an actionable way. This is done by capturing how the building blocks affect their surround-ings, as described in (Schuts 2018). This includes static and dynamic behavior of a single interface, multiple interfaces, an entire component, multiple components, and the complete architecture.…”
Section: Expertise Teams and Roadmapsmentioning
confidence: 99%
“…The resulting Mealy machine is transformed into a nondeterministic Moore machine. The trivial solution for the case of positive traces only is the basis for the work in [39]. Note that this is different from the state merging approach.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast, the approach in our previous paper [39], first transforms an event log into a type of Moore automata [24] and then into a ComMA state machine and a set of time constraints. The idea in that paper is to identify event groups that start with a client-initiated event (command or signal) followed by zero or more server-initiated events (notifications).…”
Section: Introductionmentioning
confidence: 99%
“…Mapping a DSL to a Moore Machine-based semantics has been done before [3,5,24]. However, to the best of our knowledge, we are the first to define a predicative semantics of a DSL based on PMSAT.…”
Section: Related Workmentioning
confidence: 99%