Automatic Reverse Engineering of Classes' Relationships

被引:0
|
作者
Hammad, Maen [1 ]
Abu-Wandi, Rajaa [1 ]
Aydeh, Haneen [1 ]
机构
[1] Hashemite Univ, Dept Software Engn, Zarqa, Jordan
来源
关键词
Reverse engineering; Software metrics; Class coupling; TOOL;
D O I
10.1007/978-3-319-32467-8_111
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Classes are the core of object oriented systems. Any maintenance activity includes performing a code change to one or more classes. Any code change to one class may affect other classes in the project. So, developers need to be aware and fully understand the structure and the relationships between classes. This paper proposes a technique to automatically extract various types of class's relationships from source code. The proposed technique extracts relationships among classes and measures their involvements in relationships. Fan-in and Fan-out metrics are used to give developers more comprehensive picture about the current status of coupling for each class.
引用
收藏
页码:1267 / 1272
页数:6
相关论文
共 50 条
  • [1] Automatic Reverse Engineering of Malware Emulators
    Sharif, Monirul
    Lanzi, Andrea
    Giffin, Jonathon
    Lee, Wenke
    PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, : 94 - 109
  • [2] Reverse engineering functional classes:: a middleware case study
    Mayra, Hannu
    Ronkko, Mauno
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 432 - 437
  • [3] Automatic detection of design pattern for reverse engineering
    Lee, Hakjin
    Youn, Hyunsang
    Lee, Eunseok
    SERA 2007: 5TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT, AND APPLICATIONS, PROCEEDINGS, 2007, : 577 - +
  • [4] A Survey of Automatic Protocol Reverse Engineering Tools
    Narayan, John
    Shukla, Sandeep K.
    Clancy, T. Charles
    ACM COMPUTING SURVEYS, 2015, 48 (03)
  • [5] Tupni: Automatic Reverse Engineering of Input Formats
    Cui, Weidong
    Peinado, Marcus
    Chen, Karl
    Wang, Helen J.
    Irun-Briz, Luiz
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 391 - 402
  • [6] ReFormat: Automatic Reverse Engineering of Encrypted Messages
    Wang, Zhi
    Jiang, Xuxian
    Cui, Weidong
    Wang, Xinyuan
    Grace, Mike
    COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 200 - +
  • [7] Automatic protocol reverse engineering using grammatical inference
    Xiao, Ming-Ming
    Luo, Yu-Ping
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2017, 32 (05) : 3585 - 3594
  • [8] Towards Automatic Reverse Engineering of Software Security Configurations
    Wang, Rui
    Wang, XiaoFeng
    Zhang, Kehuan
    Li, Zhuowei
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 245 - 255
  • [9] Automatic segmentation of digitized data for reverse engineering applications
    Alrashdan, A
    Motavalli, S
    Fallahi, B
    IIE TRANSACTIONS, 2000, 32 (01) : 59 - 69
  • [10] Automatic instruction scheduler retargeting by reverse-engineering
    Bridges, Matthew J.
    Vachharajani, Neil
    Ottoni, Guilherme
    August, David I.
    ACM SIGPLAN NOTICES, 2006, 41 (06) : 228 - 238