 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
¨ |
Reverse
Engineering Is Obviously Most
|
|
|
Useful
For
|
|
|
|
– |
Implementation
Representation
|
|
|
|
– |
TSF
Internals
|
|
|
|
– |
Low
Level Design
|
|
|
|
– |
FSP
and HLD in lower assurance systems
|
|
|
¨ |
Interviews
Are Most Effective For
|
|
|
|
– |
HLD
and LLD in any existing system
|
|
|
|
– |
FSP,
as a starting point in existing systems
|
|