Login / Signup
Conqueror: Tamper-Proof Code Execution on Legacy Systems.
Lorenzo Martignoni
Roberto Paleari
Danilo Bruschi
Published in:
DIMVA (2010)
Keyphrases
</>
legacy systems
source code
legacy software
reverse engineering
business rules
information systems
business processes
open source
database
expert systems
peer to peer
distributed environment
data quality
workflow management systems