2013 20th Working Conference on Reverse Engineering (WCRE) (2000)
Nov. 23, 2000 to Nov. 25, 2000
Tarja Systä , Tampere University of Technology
To fully understand the underlying architecture of an object-oriented software system, both static and dynamic analyses are needed. Dynamic reverse engineering techniques are especially important for understanding the run-time behavior of objects in a distributed object systems and in systems that rely heavily on polymorphism. Shimba, a prototype reverse engineering environment, has been built to support understanding an existing Java software system. The dynamic event trace information is generated automatically as a result of running the target system under a customized sdk  debugger and viewed as scenario diagrams using the SCED tool . In SCED, state diagrams can be synthesized automatically from scenario diagrams. This facility is used to visualize the total behavior of a selected object or method, disconnected from the rest of the system. This paper demonstrates how Shimba aids understanding the behavior of Java programs. A case study in made to validate the usefulness of the approach. The system under investigation is the FUJABA environment consisting of almost 700 Java classes.
Tarja Systä, "Understanding the Behavior of Java Programs", 2013 20th Working Conference on Reverse Engineering (WCRE), vol. 00, no. , pp. 214, 2000, doi:10.1109/WCRE.2000.891472