skip to main content
10.1145/3647444.3647909acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimmiConference Proceedingsconference-collections
research-article

Using SVM Classification and Reverse Engineering to Generate Trustworthy Code in Software Development

Published: 13 May 2024 Publication History

Abstract

Software engineering refers to the science of analysing programme operation. Software engineers use reverse engineering to create code from a previously created model. Software engineers utilise the abstract-present model to transform the sequence model into executable code. The first phase's generated code will be used as a starting point for the second. The enhancement will be suggested inside the abstract-present model in order to produce trustworthy code. The SVM classifier will be used to determine what code is necessary and what is not before moving on to the next step of development.

References

[1]
C. Willems and F. C. Freiling, “Reverse code engineering - state of the art and countermeasures,” it - Information Technology, vol. 54, no. 2, pp. 53–63, 2012.
[2]
Kumar, R. (2023, March). An Enhanced Framework for Data Protection in Cloud Environment using ECL-GWO Technique. In 2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA) (pp. 432-441).IEEE.
[3]
B. Shakya, “Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation,” in Hardware Protection through Obfuscation. Springer, 2017, ch. 1, pp. 3–32.
[4]
Singh, T., Vaid, R., & Sharma, A. (2022, July). Security Issues in Blockchain Integrated WSN: Challenges and Concerns. In 2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES) (pp. 1-5).IEEE.
[5]
Subramanyan, “Reverse Engineering Digital Circuits Using Structural and FunctionalAnalyses,” IEEE Trans. Emerging Topics Comput., vol. 2, no. 1, pp. 63–80, 2014.
[6]
U. Guin, “Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain,” Proceedings of the IEEE, vol. 102, no. 8, pp. 1207–1228, 2014.
[7]
Kumar, R. (2022, May). Security Enabled Framework to Access Information in Cloud Environment. In 2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON) (Vol. 1, pp. 578-582).IEEE.
[8]
A. Vijayakumar, “Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques,” IEEE Trans. Information Forensics and Security, vol. 12, no. 1, pp. 64–77, 2017.
[9]
G. Chechik and D. Koller, “Timing properties of gene expression responses to environmental changes,” Journal of Computational Biology, vol. 16, no. 2, pp. 279–290, 2009
[10]
L. Bintu, N. E. Buchler, H. G. Garcia, U. Gerland, T. Hwa, J. Kondev, and R. Phillips, “Transcriptional regulation by the numbers: models,” Current Opinion in Genetics & Development, vol. 15, no. 2, pp. 116 – 124, 2005, chromosomes and expression mechanisms.
[11]
P. Clements and L. Northrop. Software Product Lines: Practices and Patterns. Addison-Wesley, 2001.
[12]
K. Pohl, G. B¨ockle, and F. van der Linden. Software Product Line Engineering: Foundations, Principles, and Techniques. Springer, 2005.
[13]
S. Liaskos On goal-based variability acquisition and analysis. In Int'l ReqsEngConf, pages 76–85, Minneapolis, USA, September 2006.
[14]
Dar, M. Y., & Singh, T. Thp: Triple Heterogeneous Protocol For Energy Efficient With Bwsn.
[15]
NanNiu, Steve Easterbrook, "Extracting and Modeling Product Line Functional Requirements," re, pp.155-164, 2008 16th IEEE International Requirements Engineering Conference, 2008
[16]
I, "Misuse Cases Help to Elicit Non- Functional Requirements," Computing & Control Engineering Journal, 14, 40-45, 2003.
[17]
Sharma, R. (2016). Embedded Systems Dilemma of Chip Memory Diversity by Scratchpad Memory for Cache On-chip Memory. International Journal of Engineering, Pure and Applied Sciences, 1(1), 1-4.
[18]
Xiao Hong Chen, Ronghua, Haiying Sun and Hong Lu Deriving Requirements Specification With Time: A Software Environment Ontology based Approach Computer Software and Applications Conference (COMPSAC), Kyoto, pp 431- 436, 2013.
[19]
Sharma, R.K.; Ghandi, P (2017). Estimate Reliability of Component Based Software System Using Modified Neuro Fuzzy Model. International Journal of Engineering & Technology, v.6, n.2, pp. 45-49.
[20]
F. Shull, How Perspective-Based Reading Can Improve Requirements Inspections, IEEE Computer, Vol. 33, No. 7, pp. 73-79, Jul.2000.
[21]
C. Denger and T. Olsson, Quality Assurance in Requirements Engineering, in Engineering and Managing Software Requirements, A. Aurum and C. Wohlin, Eds. Springer, pp. 163-185, 2005
[22]
R. K., & Gandhi, P. (2016). Quality assurance of component based software systems. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 3850-3854).IEEE.
[23]
Sharma, R. K., & Ghandi, P. (2018). Reliability Estimation and Optimization: A Neuro Fuzzy Based Approach. International Journal of Computer Science and Information Security (IJCSIS), 16(12).
[24]
D. Liu, K. Subramaniam, A. Eberlein, and B. H. Far, “Natural language requirements analysis and class model generation using UCDA,” in Lecture Notes in Computer Science. Springer-Verlag, 2004, pp. 295–304.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine Intelligence
November 2023
1215 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. BSS
  2. CAD
  3. IVR
  4. Keywords—SVM
  5. NS2
  6. RA

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIMMI 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 4
    Total Downloads
  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)2
Reflects downloads up to 22 Sep 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media