Advertisement

Integrated Reverse Engineering Process Model

  • Ghulam Rasool
  • Ilka Philippow
Conference paper

Abstract

The continual process of technology, new business requirements and stakeholder’s needs escort to frequent migration from legacy systems to more powerful, dedicated, secure and reliable computing systems. The reverse engineering techniques and tools are used to extract the structure of existing legacy systems starting form the implementations and going back to design, architecture and requirements. Software engineers are using different methodologies, recovery techniques and tools according to nature, complexity and size of software. The existing recovery techniques and tools are not integrated with each other. This paper introduces novel software reverse engineering process model integrated with different recovery approaches, tools and traceability links to extract different artifacts from legacy systems.

Keywords:

Reverse engineering architecture recovery program understanding reverse engineering process 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

Acknowledgment

I would like to thanks to Prof. Dr. Metthias Riebisch for his precious comments and suggestions for this research.

References

  1. [1]
    Erlikh, L., “Leveraging legacy system dollars for E-business”. (IEEE) IT Pro, May/June 2000, pp.17–23.Google Scholar
  2. [2]
    IBM Executive Brief, Legacy Transformation: Finding New Business Value in Older Applications, 2005. http://www-306.ibm.com/software/info/features/bestofboth/.
  3. [3]
    Pressman, Roger S., Software Engineering: A Practitioner’s Approach, McGraw Hill, 1997.Google Scholar
  4. [4]
    Nadim Asif, “Software Revere Engineering”, ISBN 969-9062-00-2 Pakistan, 2006.Google Scholar
  5. [5]
    Fabio Abbattista, Gregorio M.G. Fatone, Filippo Lanubile, Giuseppe Visaggio, “Analyzing the Application of a Reverse Engineering Process to a Real Situation”, In Proc. Of Third Workshop Program Comprehension, Washington D.C., pp. 62–71, Nov. 1994.Google Scholar
  6. [6]
    Murphy G, Notkin D, “ A Re-engineering with Reflection Model”, A Case Study”, Computer 30, 8, 1997, pp. 29–36.Google Scholar
  7. [7]
    Patrick Mäder, Ilka Philippow, Matthias Riebisch, “A Traceability Link Model for the Unified Process” International Association for Computer & Information Science, 2007. IEEE Computer Society, 2007, pp. 700–705.Google Scholar
  8. [8]
    J.M. DeBaud, B. Moopen, S. Rugaber, “Domain Analysis and Reverse Engineering,” http://www.cc.gatech.edu/reverse/papers.html [accessed on March, 2007.
  9. [9]
    Hongji Yang, “Software evolution with UML and XML”, Idea Group Publishing, 2005, page 58, 2004.Google Scholar
  10. [10]
    A.Von MayrHauser ,A.M. Vans, “Program Comprehension during Software Maintenance and Evolution”, IEEE Computer, vol. 28. pp 44–55, August 1999.Google Scholar
  11. [11]
    Ilian Pashov, “Feature Based Methodology for supporting architecture refactoring and maintenance of long-life software systems”, PhD thesis , TU Ilmenau 2004.Google Scholar
  12. [12]
    Rainer Koschke, Gerardo Canfora, Jörg Czeranski, “Revisiting the ΔIC approach to component recovery”, Science of Computer Programming, Volume 60, Issue 2 (ISSN:0167-6423 ), Pages: 171 – 188 , April 2006.MATHCrossRefMathSciNetGoogle Scholar
  13. [13]
    Rugaber S, Stirewalt K “Model-Dreiven Reverse Enginering”, IEEE Software vol 21, issue 4,July-August 2004,pp.45–53.CrossRefGoogle Scholar
  14. [14]
    Murphy G, Notkin D “ Leightweight lexical Source Model Extraction” ACM transactions on Software Engineering and methodology Vol 5, 1996.Google Scholar
  15. [15]
    R.Keller, R.Schauer, S.Robitaille, P.Page, “ Pattern Based Reverse-Engineering of Design Components”. In Proc. 21st International Conference on Software Engineering, 1999.Google Scholar
  16. [16]
    Ghulam Rasool, Nadim Asif, “ Software Artifacts Recovery Using Abstract Regular Expressions”, In Proc of 11th IEEE Multitopic Conference , 28-30 December 2007 , Comsats Institute of IT Lahore Campus.Google Scholar
  17. [17]
    Ilka Philippow, Detlef Streitferdt, Matthias Riebisch, Sebastian Naumann, “An approach for reverse engineering of design patterns”, Accepted: 29 January 2004/Published online: 29 April 2004 – Springer-Verlag 2004.Google Scholar
  18. [18].
    Martin Pinzger, Harald Gall, “Pattern-Supported Architecture Recovery”, In Proceedings of 10th International Workshop on Program Comprehension (IWPC ‘02)”, 27-28 June,2002 Paris, pp. 53–61.Google Scholar
  19. [19]
    Bansiya J (1998) Automatic Design-Pattern Identification.,Dr. Dobb’s Journal. Available online at: http://www.ddj.com
  20. [20]
    Keller RK, Schauer R, Robitaille S, “Pattern based reverse engineering of design components”, In Proceeding of the 21st International Conference On Software Engineering. IEEE Computer Society Press, pp 226–235.Google Scholar
  21. [21]
    Pashov, I., Riebisch, M.,” Using Feature Modeling for Program Comprehension and Software Architecture Recovery”. In Proc of 11th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS2004)”, May 24-27, 2004, Brno, Czech Republic, pp. 406–117Google Scholar
  22. [22]

Copyright information

© Springer Science+Business Media B.V. 2010

Authors and Affiliations

  1. 1.Software Systems/Process Informatics GroupTechnical University of Ilmenau GermanyIlmenauGermany

Personalised recommendations