Interviews
¨ Data Mining On the Developers Or
Maintainers
¨ Especially Useful When
HLD is least abstract representation required
System is horribly complex legacy code
Access to source code, and therefore use of
reverse engineering, is hard
There exist one or more “gurus” who can
answer all, or most, questions about the system
after thinking for a short time
600.436 High-
Assurance Systems
Fall 01/System Security Realization
61