Loading…

Requirements for tools for comprehending highly specialized assembly language code and how to elicit these requirements

Program comprehension tools used with assembly language—often for maintaining legacy software or reverse engineering malware threats—are dated and fail to provide rudimentary features found in tool support for higher-level languages. The need for people who can maintain these legacy systems is growi...

Full description

Saved in:
Bibliographic Details
Published in:Requirements engineering 2016-03, Vol.21 (1), p.131-159
Main Authors: Baldwin, Jennifer, Teh, Alvin, Baniassad, Elisa, van Rooy, Dirk, Coady, Yvonne
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c467t-3ddd28247b56e9be017e23aaf4d667d64cfd2268346bf32b51328b220c8c58f13
cites cdi_FETCH-LOGICAL-c467t-3ddd28247b56e9be017e23aaf4d667d64cfd2268346bf32b51328b220c8c58f13
container_end_page 159
container_issue 1
container_start_page 131
container_title Requirements engineering
container_volume 21
creator Baldwin, Jennifer
Teh, Alvin
Baniassad, Elisa
van Rooy, Dirk
Coady, Yvonne
description Program comprehension tools used with assembly language—often for maintaining legacy software or reverse engineering malware threats—are dated and fail to provide rudimentary features found in tool support for higher-level languages. The need for people who can maintain these legacy systems is growing, as is the number of malicious cyberspace threats. To build new visualization and analysis tools within this domain, we need to understand the unique challenges faced by these developers. This paper presents the results of an exploratory case study to elicit requirements from two uniquely specialized groups of assembly language developers in an industrial setting: a large multi-national company developing mainframe software and a government defense facility analyzing malware and security flaws. In addition to surveys, observations and interviews, this study applies social psychology and nominal group techniques. We provide a ranking, and detailed description, for the requirements elicited in each group. We further include additional requirements obtained from observational studies. The ultimate conclusion we reach is that while similarities exist at a high level, upon deeper inspection, each group is quite unique with regard to their tooling needs.
doi_str_mv 10.1007/s00766-014-0214-y
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1793255711</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1793255711</sourcerecordid><originalsourceid>FETCH-LOGICAL-c467t-3ddd28247b56e9be017e23aaf4d667d64cfd2268346bf32b51328b220c8c58f13</originalsourceid><addsrcrecordid>eNp1kc1L5TAUxcPgwDyf_gGzC8zGTcd8NWmXIn4MCIIouAtpcttG2uaZtMjzr5886kIENzfh8jvnHjgI_abkLyVEnac8pCwIFQVheex_oA0VnOUNeT5CG1ILVXBJ2C90nNILIUyout6gtwd4XXyEEaY54TZEPIcwrD8bxl2EHibnpw73vuuHPU47sN4M_h0cNinB2OTlYKZuMR1kiQNsJof78JadMAze-hnPPSTA8dOpE_SzNUOC0493i56urx4vb4u7-5t_lxd3hRVSzQV3zrEqZ21KCXUDhCpg3JhWOCmVk8K2jjFZcSGblrOmpJxVDWPEVrasWsq36Gz13cXwukCa9eiThSEnhrAkTVXNWVkqekD_fEFfwhKnnC5TUkihSlpniq6UjSGlCK3eRT-auNeU6EMVeq1C5yr0oQq9zxq2alJmpw7iJ-dvRf8BliaOWA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1764647519</pqid></control><display><type>article</type><title>Requirements for tools for comprehending highly specialized assembly language code and how to elicit these requirements</title><source>Springer Link</source><creator>Baldwin, Jennifer ; Teh, Alvin ; Baniassad, Elisa ; van Rooy, Dirk ; Coady, Yvonne</creator><creatorcontrib>Baldwin, Jennifer ; Teh, Alvin ; Baniassad, Elisa ; van Rooy, Dirk ; Coady, Yvonne</creatorcontrib><description>Program comprehension tools used with assembly language—often for maintaining legacy software or reverse engineering malware threats—are dated and fail to provide rudimentary features found in tool support for higher-level languages. The need for people who can maintain these legacy systems is growing, as is the number of malicious cyberspace threats. To build new visualization and analysis tools within this domain, we need to understand the unique challenges faced by these developers. This paper presents the results of an exploratory case study to elicit requirements from two uniquely specialized groups of assembly language developers in an industrial setting: a large multi-national company developing mainframe software and a government defense facility analyzing malware and security flaws. In addition to surveys, observations and interviews, this study applies social psychology and nominal group techniques. We provide a ranking, and detailed description, for the requirements elicited in each group. We further include additional requirements obtained from observational studies. The ultimate conclusion we reach is that while similarities exist at a high level, upon deeper inspection, each group is quite unique with regard to their tooling needs.</description><identifier>ISSN: 0947-3602</identifier><identifier>EISSN: 1432-010X</identifier><identifier>DOI: 10.1007/s00766-014-0214-y</identifier><language>eng</language><publisher>London: Springer London</publisher><subject>Analysis ; Assembly language ; Case studies ; Computer programs ; Computer Science ; Developers ; Legacy ; Mainframe ; Malware ; Original Article ; Reverse engineering ; Social psychology ; Software ; Software Engineering</subject><ispartof>Requirements engineering, 2016-03, Vol.21 (1), p.131-159</ispartof><rights>Springer-Verlag London 2014</rights><rights>Springer-Verlag London 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c467t-3ddd28247b56e9be017e23aaf4d667d64cfd2268346bf32b51328b220c8c58f13</citedby><cites>FETCH-LOGICAL-c467t-3ddd28247b56e9be017e23aaf4d667d64cfd2268346bf32b51328b220c8c58f13</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><creatorcontrib>Baldwin, Jennifer</creatorcontrib><creatorcontrib>Teh, Alvin</creatorcontrib><creatorcontrib>Baniassad, Elisa</creatorcontrib><creatorcontrib>van Rooy, Dirk</creatorcontrib><creatorcontrib>Coady, Yvonne</creatorcontrib><title>Requirements for tools for comprehending highly specialized assembly language code and how to elicit these requirements</title><title>Requirements engineering</title><addtitle>Requirements Eng</addtitle><description>Program comprehension tools used with assembly language—often for maintaining legacy software or reverse engineering malware threats—are dated and fail to provide rudimentary features found in tool support for higher-level languages. The need for people who can maintain these legacy systems is growing, as is the number of malicious cyberspace threats. To build new visualization and analysis tools within this domain, we need to understand the unique challenges faced by these developers. This paper presents the results of an exploratory case study to elicit requirements from two uniquely specialized groups of assembly language developers in an industrial setting: a large multi-national company developing mainframe software and a government defense facility analyzing malware and security flaws. In addition to surveys, observations and interviews, this study applies social psychology and nominal group techniques. We provide a ranking, and detailed description, for the requirements elicited in each group. We further include additional requirements obtained from observational studies. The ultimate conclusion we reach is that while similarities exist at a high level, upon deeper inspection, each group is quite unique with regard to their tooling needs.</description><subject>Analysis</subject><subject>Assembly language</subject><subject>Case studies</subject><subject>Computer programs</subject><subject>Computer Science</subject><subject>Developers</subject><subject>Legacy</subject><subject>Mainframe</subject><subject>Malware</subject><subject>Original Article</subject><subject>Reverse engineering</subject><subject>Social psychology</subject><subject>Software</subject><subject>Software Engineering</subject><issn>0947-3602</issn><issn>1432-010X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNp1kc1L5TAUxcPgwDyf_gGzC8zGTcd8NWmXIn4MCIIouAtpcttG2uaZtMjzr5886kIENzfh8jvnHjgI_abkLyVEnac8pCwIFQVheex_oA0VnOUNeT5CG1ILVXBJ2C90nNILIUyout6gtwd4XXyEEaY54TZEPIcwrD8bxl2EHibnpw73vuuHPU47sN4M_h0cNinB2OTlYKZuMR1kiQNsJof78JadMAze-hnPPSTA8dOpE_SzNUOC0493i56urx4vb4u7-5t_lxd3hRVSzQV3zrEqZ21KCXUDhCpg3JhWOCmVk8K2jjFZcSGblrOmpJxVDWPEVrasWsq36Gz13cXwukCa9eiThSEnhrAkTVXNWVkqekD_fEFfwhKnnC5TUkihSlpniq6UjSGlCK3eRT-auNeU6EMVeq1C5yr0oQq9zxq2alJmpw7iJ-dvRf8BliaOWA</recordid><startdate>20160301</startdate><enddate>20160301</enddate><creator>Baldwin, Jennifer</creator><creator>Teh, Alvin</creator><creator>Baniassad, Elisa</creator><creator>van Rooy, Dirk</creator><creator>Coady, Yvonne</creator><general>Springer London</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M2P</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope></search><sort><creationdate>20160301</creationdate><title>Requirements for tools for comprehending highly specialized assembly language code and how to elicit these requirements</title><author>Baldwin, Jennifer ; Teh, Alvin ; Baniassad, Elisa ; van Rooy, Dirk ; Coady, Yvonne</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c467t-3ddd28247b56e9be017e23aaf4d667d64cfd2268346bf32b51328b220c8c58f13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Analysis</topic><topic>Assembly language</topic><topic>Case studies</topic><topic>Computer programs</topic><topic>Computer Science</topic><topic>Developers</topic><topic>Legacy</topic><topic>Mainframe</topic><topic>Malware</topic><topic>Original Article</topic><topic>Reverse engineering</topic><topic>Social psychology</topic><topic>Software</topic><topic>Software Engineering</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Baldwin, Jennifer</creatorcontrib><creatorcontrib>Teh, Alvin</creatorcontrib><creatorcontrib>Baniassad, Elisa</creatorcontrib><creatorcontrib>van Rooy, Dirk</creatorcontrib><creatorcontrib>Coady, Yvonne</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Science Database</collection><collection>ProQuest Engineering Database</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><collection>ProQuest Central Basic</collection><jtitle>Requirements engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Baldwin, Jennifer</au><au>Teh, Alvin</au><au>Baniassad, Elisa</au><au>van Rooy, Dirk</au><au>Coady, Yvonne</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Requirements for tools for comprehending highly specialized assembly language code and how to elicit these requirements</atitle><jtitle>Requirements engineering</jtitle><stitle>Requirements Eng</stitle><date>2016-03-01</date><risdate>2016</risdate><volume>21</volume><issue>1</issue><spage>131</spage><epage>159</epage><pages>131-159</pages><issn>0947-3602</issn><eissn>1432-010X</eissn><abstract>Program comprehension tools used with assembly language—often for maintaining legacy software or reverse engineering malware threats—are dated and fail to provide rudimentary features found in tool support for higher-level languages. The need for people who can maintain these legacy systems is growing, as is the number of malicious cyberspace threats. To build new visualization and analysis tools within this domain, we need to understand the unique challenges faced by these developers. This paper presents the results of an exploratory case study to elicit requirements from two uniquely specialized groups of assembly language developers in an industrial setting: a large multi-national company developing mainframe software and a government defense facility analyzing malware and security flaws. In addition to surveys, observations and interviews, this study applies social psychology and nominal group techniques. We provide a ranking, and detailed description, for the requirements elicited in each group. We further include additional requirements obtained from observational studies. The ultimate conclusion we reach is that while similarities exist at a high level, upon deeper inspection, each group is quite unique with regard to their tooling needs.</abstract><cop>London</cop><pub>Springer London</pub><doi>10.1007/s00766-014-0214-y</doi><tpages>29</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0947-3602
ispartof Requirements engineering, 2016-03, Vol.21 (1), p.131-159
issn 0947-3602
1432-010X
language eng
recordid cdi_proquest_miscellaneous_1793255711
source Springer Link
subjects Analysis
Assembly language
Case studies
Computer programs
Computer Science
Developers
Legacy
Mainframe
Malware
Original Article
Reverse engineering
Social psychology
Software
Software Engineering
title Requirements for tools for comprehending highly specialized assembly language code and how to elicit these requirements
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T18%3A53%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Requirements%20for%20tools%20for%20comprehending%20highly%20specialized%20assembly%20language%20code%20and%20how%20to%20elicit%20these%20requirements&rft.jtitle=Requirements%20engineering&rft.au=Baldwin,%20Jennifer&rft.date=2016-03-01&rft.volume=21&rft.issue=1&rft.spage=131&rft.epage=159&rft.pages=131-159&rft.issn=0947-3602&rft.eissn=1432-010X&rft_id=info:doi/10.1007/s00766-014-0214-y&rft_dat=%3Cproquest_cross%3E1793255711%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c467t-3ddd28247b56e9be017e23aaf4d667d64cfd2268346bf32b51328b220c8c58f13%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1764647519&rft_id=info:pmid/&rfr_iscdi=true