Home // ICSEA 2017, The Twelfth International Conference on Software Engineering Advances // View article


Extracting Executable Architecture From Legacy Code Using Static Reverse Engineering

Authors:
Rehman Arshad
Kung Kiu Lau

Keywords: Reverse Engineering; Static Analysis; Component Based Development; Abstract Syntax Tree.

Abstract:
Static reverse engineering techniques are based on structural information of the code. They work by building a model of abstraction that considers control structures in the code in order to extract some high-level notation. So far, most of these techniques produce abstraction models or feature locations but not the executable architecture that can transform the legacy code into modern paradigm of programming. Few approaches that extract architectural notation either require the code to be in component based orientation or lack automation. This paper presents an ongoing research that can extract executable architecture as X-MAN (component model) components from legacy code. An executable architecture contains structural and behavioural aspects of the system in an analysed manner. The extracted components can be integrated with other systems due to re-usability of the X-MAN component model. This approach neither requires the source code to be in component based orientation nor it lacks automation.

Pages: 55 to 59

Copyright: Copyright (c) IARIA, 2017

Publication date: October 8, 2017

Published in: conference

ISSN: 2308-4235

ISBN: 978-1-61208-590-6

Location: Athens, Greece

Dates: from October 8, 2017 to October 12, 2017