The Community for Technology Leaders
2013 20th Working Conference on Reverse Engineering (WCRE) (2001)
Suttgart, Germany
Oct. 2, 2001 to Oct. 5, 2001
ISSN: 1095-1350
ISBN: 0-7695-1303-4
pp: 345
Jianhua Shao , Cardiff University
Suzanne M. Embury , University of Manchester
One of the principal aims of data reverse engineering is to facilitate comprehension of the internal structure and behaviour of data-intensive systems by programmers. However, the majority of the research in this area has so far concentrated on the development of techniques to assist comprehension of the data structures used by such systems, and much less attention has been paid to the equally pressing problem of understanding the ways in which those structures are manipulated by the systems to solve business problems. In particular, there are few tools which can help a programmer to comprehend the functionality provided by a collection of database transactions. While some relevant techniques have been developed by the software reverse engineering community, in general their applicability to transactions is limited by the fact that they focus on program state alone. In-depth analysis of source code that manipulates data stored in a database (or other persistent store) must take into account the effects of that source code on {\em both} the program state and the database state.In this paper, we present an extension of the technique of symbolic execution that takes into account the specific semantics of database access commands. This extended symbolic execution engine can extract declarative representations of the data manipulations carried out by transactions, in the form of logical conditions over the database state rather procedural manipulation of the program state. The engine is then used to annotate transactions with automatically generated comments, to assist the transaction programmer in comprehending its behaviour.
program comprehension, symbolic execution, legacy transactions, data reverse engineering
Jianhua Shao, Suzanne M. Embury, "Assisting the Comprehension of Legacy Transactions", 2013 20th Working Conference on Reverse Engineering (WCRE), vol. 00, no. , pp. 345, 2001, doi:10.1109/WCRE.2001.957841
87 ms
(Ver 3.3 (11022016))