Towards a better comprehensibility of web applications: lessons learned from reverse engineering experiments

Author(s):  
G.A. Di Lucca ◽  
A.R. Fasolino ◽  
P. Tramontana
2020 ◽  
Author(s):  
Patricia O'Campo ◽  
Alisa Velonis ◽  
Pearl Buhariwala ◽  
Janisha Kamalanathan ◽  
Maha Awaiz Hassan

BACKGROUND The popularity of mHealth technology has resulted in the development of numerous applications for almost every type of self-improvement or disease management. M- and e-health solutions for increasing awareness about and safety around partner violence is no exception. OBJECTIVE These applications allow women to control access to these resources and provide unlimited, and with the right design features, safe access when these resources are needed. Few applications, however, have been designed in close collaboration with intended users to ensure relevance and effectiveness. METHODS We report here on the design of a pair of evidence-based m- and e-health applications to facilitate early identification of unsafe relationship behaviors and tailored safety planning to reduce harm from violence including the methods by which we collaborated with and sought input from population of intended users. RESULTS The demographic characteristics of those who participated in the various surveys and interviews to inform the development of our screening and safety-decision support app are presented in (Table 2). CONCLUSIONS Finally, we share challenges we faced and lessons learned that might inform future design efforts of m- and e-health evidence-based applications.


Author(s):  
Jaime Gomez ◽  
Alejandro Bia ◽  
Antonio Parraga

This paper describes the engineering foundations of VisualWADE, a CASE tool to automate the production of Web applications. VisualWADE follows a model-driven approach focusing on requirements analysis, high level design, and rapid prototyping. In this way, an application evolves smoothly from the first prototype to the final product, and its maintenance is a natural consequence of development. The paper also discusses the lessons learned in the development of the tool and its application to several case studies in the industrial context.


2004 ◽  
Vol 16 (12) ◽  
pp. 71-101 ◽  
Author(s):  
Giuseppe Antonio Di Lucca ◽  
Anna Rita Fasolino ◽  
Porfirio Tramontana

IET Software ◽  
2012 ◽  
Vol 6 (1) ◽  
pp. 33 ◽  
Author(s):  
A. Marchetto ◽  
P. Tonella ◽  
F. Ricca

2013 ◽  
Vol 11 (2) ◽  
pp. 2302-2313 ◽  
Author(s):  
Calin Eugen Nicolae Gal-Chis

For software products, the specifications, the requirements even the variables, the code or the software modules are subject to be labelled with key-terms, or described using attributes or specific values. The purpose of these notations is linked to the semantic of the object labelled, and is used as an indexing form for that specific category. A separation of concerns meta model is proposed here to provide the support of using a unitary type of notation in labelling various kind of resources used in the process of developing software, from requirements and specifications all the way to variables, code or software modules. The use of a standard, unitary notation can have multiple benefits, covering areas like code reusability, reverse engineering, assigning technologies for development, aspect-oriented software development (AOSD), requirements engineering (engineering web applications, grouping requirements by categories, such as: technology, importance, actor, volatility, functionality).


Author(s):  
Navid Asadizanjani ◽  
Sina Shahbazmohamadi ◽  
Mark Tehranipoor ◽  
Domenic Forte

Abstract Reverse engineering of electronics systems is performed for various reasons ranging from honest ones such as failure analysis, fault isolation, trustworthiness verification, obsolescence management, etc. to dishonest ones such as cloning, counterfeiting, identification of vulnerabilities, development of attacks, etc. Regardless of the goal, it is imperative that the research community understands the requirements, complexities, and limitations of reverse engineering. Until recently, the reverse engineering was considered as destructive, time consuming, and prohibitively expensive, thereby restricting its application to a few remote cases. However, the advents of advanced characterization and imaging tools and software have counteracted this point of view. In this paper, we show how X-ray micro-tomography imaging can be combined with advanced 3D image processing and analysis to facilitate the automation of reverse engineering, and thereby lowering the associated time and cost. In this paper, we demonstrate our proposed process on two different printed circuit boards (PCBs). The first PCB is a four-layer custom designed board while the latter is a more complex commercial system. Lessons learned from this effort can be used to both develop advanced countermeasures and establish a more efficient workflow for instances where reverse engineering is deemed necessary. Keywords: Printed circuit boards, non-destructive imaging, X-ray tomography, reverse engineering.


Sign in / Sign up

Export Citation Format

Share Document