Reverse Engineering for Software Maintenance Research Paper

Exclusively available on Available only on IvyPanda® Made by Human No AI

Software Maintenance

Many companies coming on with maintaining outdated software systems which are built to run on a range of hardware types are programmed in outdated languages & undergo the incompetence which results from delayed maintenance. As software ages, the maintenance task becomes more complicated and more costly. Inferior design, unplanned programming methods, and maintenance can add to lower grade code quality that influences understanding.

Enhanced understanding of a program helps in general actions such as performing reengineering, corrective maintenance and maintaining documentation up to date. To reduce the possibility of errors set up during the change process, the software engineer has to know the system amply well so the changes which he made to the source code have expected consequences. But that much thoughtfulness is hard to recover from a heritage system following several years of function.

Program understanding is a quite undeveloped field of study for which the terminology and focus are still developing. The purpose of program understanding is to get sufficient knowledge about a software system so that it can grow defiantly. The real meaning of program understanding is recognizing objects and understanding their relation; this process is sample matching at a variety of abstraction levels. It includes the recognition, manipulation, and searching of objects in a definite demonstration of a subject system through mental model identification by the software engineer and the collection of these objects to create more abstract system representations. Analyzing the source code can assist to locate components with some characters, to locating probable blocks and poor facts of a system (Mendelzon and Sametinger, 1995).

Support Mechanisms for Program Understanding

There is a wide range of support mechanisms for helping program understanding. They are categorized into three groups: unaided browsing, leveraging corporate knowledge and experience, and computer-aided techniques like reverse engineering. Unaided browsing is basically “human ware”: the software engineer by its own turn over during source code in hard copy or browses it on net, maybe using the file system as a direction-finding help. This move is for all time used in a number of forms, but it is not actually a workable move for large systems. Commercially existing reverse engineering tools offer a bunch of restricted visions of the source in analysis (Harris et. al., 1995). A superior software engineer may be capable to track of roughly 50,000 lines of code in his head. If there is additional than that, then the quantity of information to track becomes unmanageable.

Leveraging corporate knowledge and experience is the next class of support mechanism. This is performed by mentoring or by performing casual meetings with workforce familiar with the subject system. This method can be awfully helpful if there are groups are there who have been connected with the system throughout its life span. They bear vital information about reason for which the system was designed. The majority of changes that took place over its lifespan were proven to be particularly troublesome. For example, they might be capable to give guidance on work area when performing out a new maintenance action if it is alike to an additional change that occurs in the past. This method is helpful for both adding a big-picture understanding and for knowledge regarding chosen subsystems in deep. This type of commercial information and skill is not readily available. The designers which had created the system might have not been in the company. The software system may have been purchased from a different group, or the outsourcing of maintenance. Under this circumstance, the only third kind of support mechanism: computer-aided is left. To make it easy to accept, conventional reverse engineering tools took knowledge from source code (Wu et. al., 2004).

Reverse engineering: A reverse-engineering atmosphere can handle the difficulties of program understanding by using the software engineer to take out high-level information through the low-level object. This helps software engineers to get rid of tedious, laborious and errors committing tasks like searching, code reading, and pattern matching.

The Reverse-Engineering Environment: Framework

Although considerable processes are created in a tool-based atmosphere supporting for helping in program understanding, no mechanism can categorize the technology that is presently in use. Consequently, it is complicated to compare the reason behind it, functionality, and characteristics of different program-understanding tools and processes.

The model can be used for differentiating a person support method, a number of these can be evaluated by a common terminology. Now, the model organizes quality with the broad groups of cognitive-model support, reverse-engineering tasks and canonical activities.

The reverse-engineering environment framework explained in this is according to a previous attempt which was called “Towards a Framework for Program Understanding”. This former work was originally attempted to seek advice from the groups on the construction and matter of the framework. Under the two individual conferences the framework has been discussed. First one was held around 1996 on Program Comprehension and the second was for the period of 1996 Software Technology Conference. One of the significant remarks received was the framework was moreover top-down. It was uncertain whether the framework was intended to describe research efforts or to describe reverse-engineering environments. The main utilization of the framework is to direct superior practitioners on reverse engineering alternatives; the framework was restructured to replicate this objective

Purpose and objectives of software reverse engineering

A common mistake about reverse engineering is that it is used only for copying others’ creations. Reverse engineering is not only used to figure what one can do but also the no of processes it can’t do. This system assists software engineers in understanding programs by evaluating code depending on the analysts’ own logic & drawing on an information base of design prospects (Biggerstaff, 1989).

Some of the different purposes of reverse engineering include:

  • Understanding working of a product more widely than by simply monitoring it
  • Inspecting and exacting fault and restrictions in current programs
  • Learning the design fundamentals of a product as a fraction of learning in engineering
  • Creating products and systems attuned so they can perform collection or share information
  • Estimating one’s creation to recognize its restrictions
  • Finding someone who has an exact copy of elements of one’s own creation
  • Generating documentation for the functioning of a product whose producer is impassive to client service requirements.
  • Converting outdated products into the latest ones by adjusting them to different systems and stands

Process of reverse engineering

The reverse engineering method starts with extracting design information. Complete (low-level) design details are taken from the source code and current design documents. Structure charts were included in the information, descriptions of data, and PDL in which processing has been described in detail. A comparable approach, but automated, is indicated somewhere else to recover documents from code. The superior design display is taken from the comprehensive design and articulated using data-flow and control-flow diagrams. The procedure steps are discussed below.

  1. Collect information: Gather all likely details regarding the program. Source code falls under Sources of information, design documents for system calls. Personnel practiced with the software should also be recognized.
  2. Examine information: Evaluation of the gathered information. It makes the person(s) performing the recovery become workable with the system and its apparatus. A preparation for dividing the program and gathering the gained information can be put together during this stage.
  3. Extract the structure: Categorize the structure of the program and use this to generate a set of structure plans. Every node in the structure plan matches a schedule known in the program. Thus the plan accounts for the calling pecking order of the program. For every edge in the plan, the information passed to a node and comes again to the node has to be recorded.
  4. Record functionality: For every node in the structure plan, trace the processing completed in the program schedule equivalent to that node. A PDL can be used to state the functional ability of the program schedule. For system and records schedules the functional ability can be explained in English or in more official information.
  5. Record data-flow: The recovered program structure and PDL can be analyzed to recognize information makeover in the software. These makeover steps explain the information processing done in the program. This information is helpful in developing a bunch of hierarchical information flow diagrams that replica the software.
  6. Record control-flow: Recognize the sophisticated control structure of the program and trace it using control-flow diagrams. This refers to sophisticated control that influences the the whole procedure of the software.
  7. Review recovered design: Evaluating the recovered design for steadiness with accessible information and accuracy. Classify any absent stuff of information and attempt to position them. Review the design to validate that it properly signifies the program.
  8. Generate documentation: This step is to create design documentation. Information telling the idea of the program, its overview, past, etc, will require to be traced. This information will mainly not be enclosed in the source code and have to be recovered from additional sources.

Program Analysis

The functional-level view examines the relationships between program structures and their behavior (function); the rationale behind program constructs is also investigated. The domain-level function is to check concepts related to the application domain. Program-analysis techniques could reflect on source code in progressively more abstract forms, which include raw and preprocessed text, tokens, trees called syntax trees, data flow graphs, Plans and also models. The more abstract forms involve supplementary syntactic and semantic analysis to communicate further to the importance and performance of the code and little to the form and structure. A different level of analysis is needed for dissimilar users and different purposes which are laid to understand the program.

Plan Recognition

Software engineers frequently stare for the code that applies to certain patterns. The patterns which are general and conventional are known as clichés. Patterns can be of various types depending on what the person or user is searching for.Whether a person is searching for syntactic structure is code or for the coding apparatus that share exact flow of data, flow of control or the relationships which are dynamic in nature. To trace such patterns, the only thing needed is a good mechanism for searching which should be close to mental model of a software engineer other than the other tools that whole concentration is on simple and cross-referencing queries. This method is known as plan recognition. It basically tries to find to discover cases of abstract demonstration of generally applied algorithms or the data structures used in the system.

Program plans are also the small symbol of code fragments. To recognize the programming plans certain methods are used. This procedure involves matching of patterns at the programming – language root level.

Architecture Recovery

As affirmed above, documentation has conventionally served a major role in aiding plan perception. On the other hand, there are momentous disparities in documentation needs for software systems of very diverse scales. Most software credentials are small and describe the program at the algorithm and structure data level. For great heritage systems, a proper understanding of the structural feature of the system structural design is more important than any particular algorithmic component. Program understanding is particularly challenging for software engineers and technical managers in charge of the repairs of such systems. The credentials that are available for such systems typically describe remote parts of that system. However it cannot explain the full architecture.

Additionally, the documentation is commonly spread throughout the system and also on unlike media. Generally repair personnel must show low-level source coding and piece simultaneously different information in a row to form high-level structural models.

Physically creating one of such architectural files is always tough; creating the essential documents that explain the architecture from multiple observations is repeatedly impossible. Yet it is just this kind of documentation that is desirable to represent the structure of big software systems. By means of reverse engineering, we can rebuild the architectural aspects of software which may be termed architecture recovery (Tilley, 1998).

Concept Assignment

Plan recognition is an enhancement over the syntactic pattern matching frequently occurring in most program study tools. However, as soon as it comes to locating source code that remains of interest to the software engineer the program plans must still be understood in terms of the implementation of programming language (or a little abstraction). It would be better if program plans which represent application-level concepts are not simply abstracted as code fragments. One move towards this problem is concept assignment.

Concept assignment is the task to discover human-originated concepts and handing over them to the implementation-oriented counterparts of the subject system. It is related to teleological maintenance, which aims to recuperate information from the subject system based on a specific user model (for illustration the business rules), to a certain extent than from the source code.

Levels of reverse engineering and activities

Redocumentation: It concentrates on creating a semantically comparable depiction at the same stage of abstraction. It is a plain type of reverse engineering. Tools for redocumentation comprise, with others, attractive printers, diagram producers, and annotation record creators.

Design recovery: In this field information and external knowledge are used to build a comparable explanation of a system at a superior level of abstraction. So, additional facts than the source code of the system are used

Restructuring: It is the concept of restructuring quantity to convert in a system as of one representation to an additional one at the similar level of abstraction. A vital portion of restructuring is that the semantic performance of the existing system and the new one should stay the identical; no alteration of the functional ability is involved.

Reengineering or renovation: The reason for reengineering or renovation is to learn the arrangement, by building a condition at an advanced abstraction level, toting up the new functional ability to this condition and building up an entirely original system on the origin of the existing one.

Supporting techniques

Forward Engineering

The long-established practice of stirring from high-level generalizations and reasonable execution of free designs to the corporeal execution of the system is known as forwarding Engineering.

While it may perhaps look redundant – in vision of the stretched-position use of design and expansion terminology – to present before you a new term, the term forward has come into being but it is very much necessary to make a distinction between both reverse and forward.Forward Engineering follows a series of departing from necessities through scheming and designing its accomplishment.

To sufficiently explain the concept of software forward and reverse engineering, we must first state carefully three needy concepts:

  • the survival of a life-cycle model,
  • the existence of a subject system, and
  • the detection of notion levels.

We imagine that an authentic life-cycle form exists for the software development process. The form may be signifying as the usual waterfall, as a twisting, or in various other forms that usually can be symbolized as a directed graph. The theme system may be a single program or code fragment, or it may be a compound set of interrelating programs, job-control directions & signal interfaces. In forwarding engineering the theme system is the result of the progressive process. It may not so far exist, or its presented parts may not so far be combined to form a system. In reverse engineering, the theme system is normally the initial point of the workout. In a life-cycle model, the premature stages pact with more general, execution self-determining concepts; afterward stages highlight execution details. There are evolutions of rising detail throughout the forward progress of the life cycle maps. Initial phases of systems scheduling and necessities meaning involve expressing the upper-level concept of the system being designed when evaluated to the execution by own. These concepts are more strongly linked to the business rules of the project. They are frequently expressed in user terms that have a one-to-many connection to the exact features of the completed system. In the same intellect a drawing is an upper-level concept of the building it symbolizes, and it might be documented as just one of the many forms (electrical, water, heating/airing/air conditioning, and outlet) that should come collectively. It is significant to differentiate among level so idea, a concept that crosses theoretical phase of design, and level of generalization in a solo phase. On both sides of life-cycle phases engage in an evolution from upper levels ideas in initial phase to lower generalization levels in the afterward stages. While representing knowledge in any life-cycle stage in comprehensive form (lower degree of abstraction) or additional abridged or universal pattern (higher degree of abstraction).

Re-engineering

Reengineering, also recognized as both restructuring and recovery, is the appraisal and difference of a theme system to reconstruct it in a new pattern and the following implementation of the new form. Reengineering usually comprises of a few forms of reverse engineering pursued by some pattern of forwarding engineering. It may consist of alteration with respect to new necessities not fulfill by the existing system. Through the reengineering of information management systems, an association, in general, reassesses how the system trappings high-level businesses rules and craft alteration to conform to modifies in the business for the prospect. There is a few misunderstanding of terms, mainly among reengineering and restructuring. The user group of IBM direct, for example, describes “application reengineering” the same as “the method of adjusting the inner mechanisms of information structures of a system without altering the functional ability.

In other terms, it is changing the how without disturbing the what. This is adjoining the definition of restructuring. “It is unusual to an application is re-engineered without supplementary functional ability being supplemented” (Chikofsky and Cross, 1990). While reengineering engrosses both forward engineering and reverse engineering it is not a hybrid of the two. Reengineering uses the forward and reverses engineering skills. Both technologies are developing speedily, autonomous of their use in engineering.

The Characteristics of a Reengineering

Reengineering only helps those private bodies which possess following characteristics:

  1. Business procedures are made easy rather than using complex procedures.
  2. Job picture increases and become open for a wide variety of persons. Thus all employees work to their best of best.
  3. Persons within the association become empowered in contrast to individual control.
  4. The stress moves away from the single person and it moves towards the group achievements.
  5. The directorial construction is altered from a ladder to final arrangement.
  6. Professionals turn out to be the key focal point for the association, not the administration staff.
  7. The whole company becomes united with the end-to-end process rather than department individual groups.
  8. The base for measurement of appearance looks missing from movement towards outcome.
  9. The role and work of the manager changes from supervisor to the trainer.
  10. People now do not worry about favoring the superiors – their only focus is pleasing i.e. making the customer.
  11. The organization’s value scheme transforms from being caring to being fruitful.

Reengineering is not exclusively about creating new business processes.

Reverse Engineering Tools

The tools of reverse engineering are:

  • The docs of Google.
  • To mix two things such tools also come in reverse engineering.
  • The credentials used in projects.
  • The correctors of assignments.
  • Correlation of data and documentation (Cobol).
  • The code crawlers.
  • Advisors
  • The process maxs.
  • C, C++, Java.
  • The surfers of the code.
  • The service publishers.
  • Visualization.
  • Bonding together.

Techniques of Reverse Engineering

  • Dealing with complications – There should be new methods to deal with the complex systems as their volume is very large. By using automated support we can control all these. Now reverse engineering used with Case atmosphere will give a new way to extract any important information.
  • Produce exchange views — As graphs are now a new era and have been now accepted for comprehensive views. Reverse engineering tools help to regenerate graphical representations. This engineering helps to generate additional views like control flow diagrams, charts, relationship diagrams Etc. Non-graphical things can also be represented by reverse engineering and thus it becomes an important part of the system.
  • Recuperate lost information—Due to big systems and advanced processing information gets lost. But by the use of reverse engineering, this lost information can be regained (Chikofsky,1990).
  • Discover side effects.—Due to design and process many side effects arise and can lead to unintentional consequences and side effects that hinder a system’s presentation in many ways. Forward and reverse engineering help to detect such defects and anomalies, which can cause problems to users.
  • Manufacture higher thoughts – Reverse engineering has a special feature that helps to create new views that convert to bigger abstractions levels. Thus expert systems technology plays a major role in gaining the full and almost potential of high-level abstractions.
  • To Increase Reusing Technology— The biggest issue in today’s software reusability is the voluminous body of existing software assets. This reverse engineering helps to detect modes available for reusing software components. Reverse engineering helps to reduce the overall cost of the software. By reverse-engineering the total system expense is also reduced. Thus this engineering leads to savings. Reverse engineering is now becoming a new face in the future case environment. It also helps in the development and to run process effectively.

Advantages

  1. It is a knowledgeable instrument.
  2. It is a way to formulate new well-suited products that are cheaper than currently available goods in the market.
  3. It is used for making software’s.
  4. It is use to unearth the ungraceful features of business artifacts.
  5. It is used to regain lost data.
  6. Many high thoughts can be manufactured by this engineering.
  7. This helps to detect anomalies and side effects.
  8. This engineering helps to produce views by which all graphical and non-graphical things can be presented effectively and systematically.
  9. Reverse engineering has a special feature that it helps to deal with complications, complex processes, etc.
  10. Reverse engineering helps in the merging of two things also according to the system point of view.

Conclusion

Implementation bias: Possibly the most significant issue in recovering a design is to split design information from execution information. At the execution level, it can be tricky to know what information should not be traced in the recovered design. It can be hard to ‘chuck away’ information through the abstraction process, mainly, when the goal is to again implement the system. It is required to recognize that the design does not supply program documentation. Program documentation shows the execution facts of the source code. Design documentation shows a top-level view of a program’s functions. One of the capable moves toward to the difficulties of program understanding for software development is reverse engineering (Buss, 1994).

Traceability: A recovered design is supposed to record links among recovered information and the sources. This allows traceability among the two. This research has exposed that a present software development situation can be used to record a recovered design. Still, such a tool must supply the suppleness to record information not predicted as the tool was formed.

Domain Information: The information recorded in a program is enough to clarify ‘what’ is being completed, but not ‘why’. To know the importance of a processing step, accurate information is frequently necessary. This information is repeatedly not recorded in the source code or current documentation.

Re-engineering: Reverse engineering will mainly often be done on older software systems whose documentation is outdated or imaginary. These systems will generally be contenders for re-engineering: rewording the system to develop its understandability, ease maintenance, eliminate dull code, etc. It is simpler to alter a design than source code. It seems logical to alter the recovered design.

A new edition of the system created starting design can be improved by using current procedures and programming languages. These will produce a system that is enhanced in structured, documented, and simpler to maintain than the earlier version. Thus, reverse engineering as an element of re-engineering will establish to be valuable in expanding the existence of older programs (Lamsweerdel, 2000)

In summary, this was victorious in recognizing quite a few topics in software reverse engineering. It is hoped that additional exploration into these subjects will result in a tactic for software reverse engineering and aid in the development taken to support this task.

Work Cited Page

  1. Biggerstaff, Ted J. Design Recovery for Maintenance and reuse. IEEE, 1989. 36-49.
  2. Buss, E. et. al. I. IBM Systems Journal, 33(3), IBM Corporation,1994. Web.
  3. Byrne, E. J. Software reverse engineering: a case study. Software Practise and Experience, 21 (12), 1991.
  4. Chikofsky, E. J. and Cross II, J. H. Reverse engineering and design recovery: A taxonomy. IEEE software, 1990.
  5. Dart, Susan., Christie, Alan M. and Brown, Alan W. A Case Study in Software Maintenance. Technical Report, CMU/SEI-93-TR-8, ESC-TR-93-185. Pennsylvania: Software Engineering Institute, Carnegie Mellon University, 1993.
  6. Hammer, M., and Champy, J. Reengineering the corporation: A manifesto for business revolution. Collins, 2003.
  7. Harris, David R. et. al. Reverse Engineering to the Architectural Level. Bedford: The MITRE Corporation, 1995.
  8. Hassan, A. E. and Holt, R. C. Canada, University of Waterloo, 2004. Web.
  9. Lamsweerde, A Van. Requirements engineering in the year 00: A research perspective. The Future of Software Engineering, 22nd International Conference on Software Engineering, 2000.
  10. Mendelzon, Alberto and Sametinger, Johannes. Reverse Engineering by Visualizing and Querying. Software: Concepts and Tools (1995) 16. Verlag: Springer, 1995. 170–182.
  11. Muller Hausi A., Jahnke Jens H., Smith Dennis B., Storey, M. A., Tilley, Scott R. and Wong, Kenny. , 2000. Web.
  12. Tilley, S. . Pittsburgh: Carnegie Mellon University, 1998. Web.
  13. Van den Brand, M. G. J., Klint, P. AND Verhoef, C. . ACM SIGSOFT Software Engineering Notes, 1997. Web.
  14. Wu, Xiaomin et. al. . Proceedings of the 11th Working Conference on Reverse Engineering (WCRE’04). IEEE, 2004. web.
More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 6). Reverse Engineering for Software Maintenance. https://ivypanda.com/essays/reverse-engineering-for-software-maintenance/

Work Cited

"Reverse Engineering for Software Maintenance." IvyPanda, 6 Mar. 2022, ivypanda.com/essays/reverse-engineering-for-software-maintenance/.

References

IvyPanda. (2022) 'Reverse Engineering for Software Maintenance'. 6 March.

References

IvyPanda. 2022. "Reverse Engineering for Software Maintenance." March 6, 2022. https://ivypanda.com/essays/reverse-engineering-for-software-maintenance/.

1. IvyPanda. "Reverse Engineering for Software Maintenance." March 6, 2022. https://ivypanda.com/essays/reverse-engineering-for-software-maintenance/.


Bibliography


IvyPanda. "Reverse Engineering for Software Maintenance." March 6, 2022. https://ivypanda.com/essays/reverse-engineering-for-software-maintenance/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1