For the evolution and maintenance of legacy systems, it is essential that they are reverse engineered. It is becoming important because in many Legacy systems, suitable documentation is not available which makes maint...
详细信息
ISBN:
(纸本)9781728134567
For the evolution and maintenance of legacy systems, it is essential that they are reverse engineered. It is becoming important because in many Legacy systems, suitable documentation is not available which makes maintenance. The proposed approach extracts hidden information which is useful for maintaining a software. Application modeling and data modeling are essential for the development of the software and are used for designing application and database separately. Generally, in software systems application layer is the object-orientedprogramming language and database is the backend store. Modeling of these layers separately creates inconsistency. This paper proposes a technique to reverse engineer the database schema to UML model which will incorporate modeling of an object-oriented technology on top of purely relational database. Using this conversion of database schema to UML diagram, the gap between these layers is being bridged. It will provide the understanding of the legacy system in a better way. The database schema is converted into XMI format which can be imported in a UML modeling tool. The proposed approach converts the SQL database schema as well as more frequently used SELECT statements for the schema into UML model which is in the form of XMI. By importing the generated XMI file into MagicDraw, UML model is graphically represented.
Coupling metrics are an established way to measure internal software quality with respect to modularity. Dynamic metrics have been used to improve the accuracy of static metrics for object-oriented software. We introd...
详细信息
ISBN:
(纸本)9781450356633
Coupling metrics are an established way to measure internal software quality with respect to modularity. Dynamic metrics have been used to improve the accuracy of static metrics for object-oriented software. We introduce a dynamic metric NOI that takes into account the number of interactions (method calls) during the run of a system. We used the data collected from an experiment to compute our NOI metric and compared the results to a static coupling analysis. We observed an unexpected level of correlation and significant differences between class-and package-level analyses.
Memory-corruption attacks have been subject to extensive research in the latest decades. Researchers demonstrated sophisticated attack techniques, such as (just-in-time/blind) return-orientedprogramming and counterfe...
详细信息
ISBN:
(纸本)9781939133045
Memory-corruption attacks have been subject to extensive research in the latest decades. Researchers demonstrated sophisticated attack techniques, such as (just-in-time/blind) return-orientedprogramming and counterfeit object-orientedprogramming, which enable the attacker to execute arbitrary code and data-oriented attacks that are commonly used for privilege escalation. At the same time, the research community proposed a number of effective defense techniques. In particular, control-flow integrity (CFI), code-pointer integrity (CPI), and fine-grained code randomization are effective mitigation techniques against code-reuse attacks. All of these techniques require strong memory isolation. For example, CFI's shadow stack, CPI's safe-region, and the randomization secret must be protected from adversaries able to perform arbitrary read-write accesses. In this paper we propose IMIX, a lightweight, inprocess memory isolation extension for the Intel-based x86 CPUs. Our solution extends the x86 ISA with a new memory-access permission to mark memory pages as security sensitive. These memory pages can then only be accessed with a newly introduced instruction. Unlike previous work, IMIX is not tailored towards a specific defense (technique) but can be leveraged as a primitive to protect the data of a wide variety of memory-corruption defenses. We provide a proof of concept of IMIX using Intel's Simulation and Analysis Engine. We extend Clang/LLVM to include our new instruction, and enhance CPI by protecting CPI's safe region using IMIX.
objectoriented programing has been developing for 30 years so far, however, it's in the last decade that it has kept a fast growing and developing of methodologies, by using speed and processing capability advanc...
详细信息
Software Engineering is evolving every day. New Technologies are being introduced. For fast and easy development several new methodologies are introduced. In this paper we will focus on two approaches which are Compon...
详细信息
We look at one important category of distributed applications characterized by the existence of multiple collaborating, and competing, components sharing mutable, long-lived, replicated objects. The problem addressed ...
详细信息
Assessment process in one of the most important issues in the learning process and in many cases it is the process that define the sequence of the instruction because it measures the performance of the student in the ...
详细信息
An important ingredient for a successful recipe for solving machine learning problems is the availability of a suitable dataset. However, such a dataset may have to be extracted from a large unstructured and semi-stru...
详细信息
ISBN:
(纸本)9781450351911
An important ingredient for a successful recipe for solving machine learning problems is the availability of a suitable dataset. However, such a dataset may have to be extracted from a large unstructured and semi-structured data like programming code, scripts, and text. In this work, we propose a plug-in based, extensible feature extraction framework for which we have prototyped as a tool. The proposed framework is demonstrated by extracting features from two different sources of semi-structured and unstructured data. The semistructured data comprised of web page and script based data whereas the other data was taken from email data for spam filtering. The usefulness of the tool was also assessed on the aspect of ease of programming.
Rewriting logic is both a flexible semantic framework within which widely different concurrent systems can be naturally specified and a logical framework in which widely different logics can be specified. Maude progra...
详细信息
We describe an experimental object-orientedprogramming language, ASL2, that supports program development by means of a series of abstract steps. The language allows immediate object construction, and it is possible t...
详细信息
ISBN:
(纸本)9781450315647
We describe an experimental object-orientedprogramming language, ASL2, that supports program development by means of a series of abstract steps. The language allows immediate object construction, and it is possible to use the constructed objects for concrete problem solving tasks. Classes and class hierarchies can be derived from the objects -via gradual abstract steps. We introduce two levels of object classification, called weak and strong object classification. Strong object classification relies on conventional classes, whereas weak object classification is looser, and less restrictive. As a central mechanism, weakly classified objects are allowed to borrow methods from each other. ASL2 supports class generalization, as a counterpart to class specialization and inheritance in mainstream object-orientedprogramming languages. The final abstract step discussed in this paper is a syntactical abstract step that derives a source file with a syntactical class form.
暂无评论