Loading…
Requirements for tools for comprehending highly specialized assembly language code and how to elicit these requirements
Program comprehension tools used with assembly language—often for maintaining legacy software or reverse engineering malware threats—are dated and fail to provide rudimentary features found in tool support for higher-level languages. The need for people who can maintain these legacy systems is growi...
Saved in:
Published in: | Requirements engineering 2016-03, Vol.21 (1), p.131-159 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c467t-3ddd28247b56e9be017e23aaf4d667d64cfd2268346bf32b51328b220c8c58f13 |
---|---|
cites | cdi_FETCH-LOGICAL-c467t-3ddd28247b56e9be017e23aaf4d667d64cfd2268346bf32b51328b220c8c58f13 |
container_end_page | 159 |
container_issue | 1 |
container_start_page | 131 |
container_title | Requirements engineering |
container_volume | 21 |
creator | Baldwin, Jennifer Teh, Alvin Baniassad, Elisa van Rooy, Dirk Coady, Yvonne |
description | Program comprehension tools used with assembly language—often for maintaining legacy software or reverse engineering malware threats—are dated and fail to provide rudimentary features found in tool support for higher-level languages. The need for people who can maintain these legacy systems is growing, as is the number of malicious cyberspace threats. To build new visualization and analysis tools within this domain, we need to understand the unique challenges faced by these developers. This paper presents the results of an exploratory case study to elicit requirements from two uniquely specialized groups of assembly language developers in an industrial setting: a large multi-national company developing mainframe software and a government defense facility analyzing malware and security flaws. In addition to surveys, observations and interviews, this study applies social psychology and nominal group techniques. We provide a ranking, and detailed description, for the requirements elicited in each group. We further include additional requirements obtained from observational studies. The ultimate conclusion we reach is that while similarities exist at a high level, upon deeper inspection, each group is quite unique with regard to their tooling needs. |
doi_str_mv | 10.1007/s00766-014-0214-y |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1793255711</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1793255711</sourcerecordid><originalsourceid>FETCH-LOGICAL-c467t-3ddd28247b56e9be017e23aaf4d667d64cfd2268346bf32b51328b220c8c58f13</originalsourceid><addsrcrecordid>eNp1kc1L5TAUxcPgwDyf_gGzC8zGTcd8NWmXIn4MCIIouAtpcttG2uaZtMjzr5886kIENzfh8jvnHjgI_abkLyVEnac8pCwIFQVheex_oA0VnOUNeT5CG1ILVXBJ2C90nNILIUyout6gtwd4XXyEEaY54TZEPIcwrD8bxl2EHibnpw73vuuHPU47sN4M_h0cNinB2OTlYKZuMR1kiQNsJof78JadMAze-hnPPSTA8dOpE_SzNUOC0493i56urx4vb4u7-5t_lxd3hRVSzQV3zrEqZ21KCXUDhCpg3JhWOCmVk8K2jjFZcSGblrOmpJxVDWPEVrasWsq36Gz13cXwukCa9eiThSEnhrAkTVXNWVkqekD_fEFfwhKnnC5TUkihSlpniq6UjSGlCK3eRT-auNeU6EMVeq1C5yr0oQq9zxq2alJmpw7iJ-dvRf8BliaOWA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1764647519</pqid></control><display><type>article</type><title>Requirements for tools for comprehending highly specialized assembly language code and how to elicit these requirements</title><source>Springer Link</source><creator>Baldwin, Jennifer ; Teh, Alvin ; Baniassad, Elisa ; van Rooy, Dirk ; Coady, Yvonne</creator><creatorcontrib>Baldwin, Jennifer ; Teh, Alvin ; Baniassad, Elisa ; van Rooy, Dirk ; Coady, Yvonne</creatorcontrib><description>Program comprehension tools used with assembly language—often for maintaining legacy software or reverse engineering malware threats—are dated and fail to provide rudimentary features found in tool support for higher-level languages. The need for people who can maintain these legacy systems is growing, as is the number of malicious cyberspace threats. To build new visualization and analysis tools within this domain, we need to understand the unique challenges faced by these developers. This paper presents the results of an exploratory case study to elicit requirements from two uniquely specialized groups of assembly language developers in an industrial setting: a large multi-national company developing mainframe software and a government defense facility analyzing malware and security flaws. In addition to surveys, observations and interviews, this study applies social psychology and nominal group techniques. We provide a ranking, and detailed description, for the requirements elicited in each group. We further include additional requirements obtained from observational studies. The ultimate conclusion we reach is that while similarities exist at a high level, upon deeper inspection, each group is quite unique with regard to their tooling needs.</description><identifier>ISSN: 0947-3602</identifier><identifier>EISSN: 1432-010X</identifier><identifier>DOI: 10.1007/s00766-014-0214-y</identifier><language>eng</language><publisher>London: Springer London</publisher><subject>Analysis ; Assembly language ; Case studies ; Computer programs ; Computer Science ; Developers ; Legacy ; Mainframe ; Malware ; Original Article ; Reverse engineering ; Social psychology ; Software ; Software Engineering</subject><ispartof>Requirements engineering, 2016-03, Vol.21 (1), p.131-159</ispartof><rights>Springer-Verlag London 2014</rights><rights>Springer-Verlag London 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c467t-3ddd28247b56e9be017e23aaf4d667d64cfd2268346bf32b51328b220c8c58f13</citedby><cites>FETCH-LOGICAL-c467t-3ddd28247b56e9be017e23aaf4d667d64cfd2268346bf32b51328b220c8c58f13</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><creatorcontrib>Baldwin, Jennifer</creatorcontrib><creatorcontrib>Teh, Alvin</creatorcontrib><creatorcontrib>Baniassad, Elisa</creatorcontrib><creatorcontrib>van Rooy, Dirk</creatorcontrib><creatorcontrib>Coady, Yvonne</creatorcontrib><title>Requirements for tools for comprehending highly specialized assembly language code and how to elicit these requirements</title><title>Requirements engineering</title><addtitle>Requirements Eng</addtitle><description>Program comprehension tools used with assembly language—often for maintaining legacy software or reverse engineering malware threats—are dated and fail to provide rudimentary features found in tool support for higher-level languages. The need for people who can maintain these legacy systems is growing, as is the number of malicious cyberspace threats. To build new visualization and analysis tools within this domain, we need to understand the unique challenges faced by these developers. This paper presents the results of an exploratory case study to elicit requirements from two uniquely specialized groups of assembly language developers in an industrial setting: a large multi-national company developing mainframe software and a government defense facility analyzing malware and security flaws. In addition to surveys, observations and interviews, this study applies social psychology and nominal group techniques. We provide a ranking, and detailed description, for the requirements elicited in each group. We further include additional requirements obtained from observational studies. The ultimate conclusion we reach is that while similarities exist at a high level, upon deeper inspection, each group is quite unique with regard to their tooling needs.</description><subject>Analysis</subject><subject>Assembly language</subject><subject>Case studies</subject><subject>Computer programs</subject><subject>Computer Science</subject><subject>Developers</subject><subject>Legacy</subject><subject>Mainframe</subject><subject>Malware</subject><subject>Original Article</subject><subject>Reverse engineering</subject><subject>Social psychology</subject><subject>Software</subject><subject>Software Engineering</subject><issn>0947-3602</issn><issn>1432-010X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNp1kc1L5TAUxcPgwDyf_gGzC8zGTcd8NWmXIn4MCIIouAtpcttG2uaZtMjzr5886kIENzfh8jvnHjgI_abkLyVEnac8pCwIFQVheex_oA0VnOUNeT5CG1ILVXBJ2C90nNILIUyout6gtwd4XXyEEaY54TZEPIcwrD8bxl2EHibnpw73vuuHPU47sN4M_h0cNinB2OTlYKZuMR1kiQNsJof78JadMAze-hnPPSTA8dOpE_SzNUOC0493i56urx4vb4u7-5t_lxd3hRVSzQV3zrEqZ21KCXUDhCpg3JhWOCmVk8K2jjFZcSGblrOmpJxVDWPEVrasWsq36Gz13cXwukCa9eiThSEnhrAkTVXNWVkqekD_fEFfwhKnnC5TUkihSlpniq6UjSGlCK3eRT-auNeU6EMVeq1C5yr0oQq9zxq2alJmpw7iJ-dvRf8BliaOWA</recordid><startdate>20160301</startdate><enddate>20160301</enddate><creator>Baldwin, Jennifer</creator><creator>Teh, Alvin</creator><creator>Baniassad, Elisa</creator><creator>van Rooy, Dirk</creator><creator>Coady, Yvonne</creator><general>Springer London</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M2P</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope></search><sort><creationdate>20160301</creationdate><title>Requirements for tools for comprehending highly specialized assembly language code and how to elicit these requirements</title><author>Baldwin, Jennifer ; Teh, Alvin ; Baniassad, Elisa ; van Rooy, Dirk ; Coady, Yvonne</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c467t-3ddd28247b56e9be017e23aaf4d667d64cfd2268346bf32b51328b220c8c58f13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Analysis</topic><topic>Assembly language</topic><topic>Case studies</topic><topic>Computer programs</topic><topic>Computer Science</topic><topic>Developers</topic><topic>Legacy</topic><topic>Mainframe</topic><topic>Malware</topic><topic>Original Article</topic><topic>Reverse engineering</topic><topic>Social psychology</topic><topic>Software</topic><topic>Software Engineering</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Baldwin, Jennifer</creatorcontrib><creatorcontrib>Teh, Alvin</creatorcontrib><creatorcontrib>Baniassad, Elisa</creatorcontrib><creatorcontrib>van Rooy, Dirk</creatorcontrib><creatorcontrib>Coady, Yvonne</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Science Database</collection><collection>ProQuest Engineering Database</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><collection>ProQuest Central Basic</collection><jtitle>Requirements engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Baldwin, Jennifer</au><au>Teh, Alvin</au><au>Baniassad, Elisa</au><au>van Rooy, Dirk</au><au>Coady, Yvonne</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Requirements for tools for comprehending highly specialized assembly language code and how to elicit these requirements</atitle><jtitle>Requirements engineering</jtitle><stitle>Requirements Eng</stitle><date>2016-03-01</date><risdate>2016</risdate><volume>21</volume><issue>1</issue><spage>131</spage><epage>159</epage><pages>131-159</pages><issn>0947-3602</issn><eissn>1432-010X</eissn><abstract>Program comprehension tools used with assembly language—often for maintaining legacy software or reverse engineering malware threats—are dated and fail to provide rudimentary features found in tool support for higher-level languages. The need for people who can maintain these legacy systems is growing, as is the number of malicious cyberspace threats. To build new visualization and analysis tools within this domain, we need to understand the unique challenges faced by these developers. This paper presents the results of an exploratory case study to elicit requirements from two uniquely specialized groups of assembly language developers in an industrial setting: a large multi-national company developing mainframe software and a government defense facility analyzing malware and security flaws. In addition to surveys, observations and interviews, this study applies social psychology and nominal group techniques. We provide a ranking, and detailed description, for the requirements elicited in each group. We further include additional requirements obtained from observational studies. The ultimate conclusion we reach is that while similarities exist at a high level, upon deeper inspection, each group is quite unique with regard to their tooling needs.</abstract><cop>London</cop><pub>Springer London</pub><doi>10.1007/s00766-014-0214-y</doi><tpages>29</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0947-3602 |
ispartof | Requirements engineering, 2016-03, Vol.21 (1), p.131-159 |
issn | 0947-3602 1432-010X |
language | eng |
recordid | cdi_proquest_miscellaneous_1793255711 |
source | Springer Link |
subjects | Analysis Assembly language Case studies Computer programs Computer Science Developers Legacy Mainframe Malware Original Article Reverse engineering Social psychology Software Software Engineering |
title | Requirements for tools for comprehending highly specialized assembly language code and how to elicit these requirements |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T18%3A53%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Requirements%20for%20tools%20for%20comprehending%20highly%20specialized%20assembly%20language%20code%20and%20how%20to%20elicit%20these%20requirements&rft.jtitle=Requirements%20engineering&rft.au=Baldwin,%20Jennifer&rft.date=2016-03-01&rft.volume=21&rft.issue=1&rft.spage=131&rft.epage=159&rft.pages=131-159&rft.issn=0947-3602&rft.eissn=1432-010X&rft_id=info:doi/10.1007/s00766-014-0214-y&rft_dat=%3Cproquest_cross%3E1793255711%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c467t-3ddd28247b56e9be017e23aaf4d667d64cfd2268346bf32b51328b220c8c58f13%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1764647519&rft_id=info:pmid/&rfr_iscdi=true |