z-logo
open-access-imgOpen Access
Reverse engineering models of software interfaces
Author(s) -
Debjyoti Bera,
Mathijs Schuts,
Jozef Hooman,
Ivan Kurtev
Publication year - 2021
Publication title -
computer science and information systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.244
H-Index - 24
eISSN - 2406-1018
pISSN - 1820-0214
DOI - 10.2298/csis200131013b
Subject(s) - computer science , exploit , interface (matter) , dependency graph , event (particle physics) , component (thermodynamics) , graph , reverse engineering , process (computing) , formal methods , component based software engineering , set (abstract data type) , finite state machine , state (computer science) , formal specification , software , software system , programming language , theoretical computer science , operating system , physics , computer security , bubble , quantum mechanics , maximum bubble pressure method , thermodynamics
Cyber-physical systems consist of many hardware and software components. Over the lifetime of these systems their components are often replaced or updated. To avoid integration problems, formal specifications of component interface behavior are crucial. Such a formal specification captures not only the set of provided operations but also the order of using them and the constraints on their timing behavior. Usually the order of operations are expressed in terms of a state machine. For new components such a formal specification can be derived from requirements. However, for legacy components such interface descriptions are usually not available. So they have to be reverse engineered from existing event logs and source code. This costs a lot of time and does not scale very well. To improve the efficiency of this process, we present a passive learning technique for interface models inspired by process mining techniques. The approach is based on representing causal relations between events present in an event log and their timing information as a timed-causal graph. The graph is further processed and eventually transformed into a state machine and a set of timing constraints. Compared to other approaches in literature which focus on the general problem of inferring state-based behavior, we exploit patterns of client-server interactions in event logs.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here