Reverse engineering is the process of discovering the technological principles of a human made device, object or system through analysis of its structure,

Slides:



Advertisements
Similar presentations
Test process essentials Riitta Viitamäki,
Advertisements

Chapter 5: Common Support Problems
Module 2, Office Layout.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 2 Slide 1 Systems engineering 2.
Product Disassembly. Disassembly or teardown of a product is a major step in the Reverse Engineering process. It uncovers the principles behind how a.
Fundamentals of Computer Forensics Fundamentals of Computer Forensics by Jim Bates,published Feb 1997, International Journal of Forensic Computing “…This.
Chapter 6: Design of Expert Systems
Lab/Sessional -CSE-374. SYSTEM DEVELOPMENT LIFE CYCLE.
Computer Assisted Audit Techniques
An expert system is a package that holds a body of knowledge and a set of rules on a subject that has been gained from human experts. An expert system.
Software Protection & Scope of the Right holder Options for Developing Countries Presentation by: Dr. Ahmed El Saghir Judge at the Council of State Courts.
Communications Systems EDU-2460 Topic: Computer Aided Design (Chapter 2) By Leetyler Edwyn Dailey.
Engineering Design and Problem Solving
System Testing There are several steps in testing the system: –Function testing –Performance testing –Acceptance testing –Installation testing.
Managing Marketing Information ROAD MAP: Previewing the Concepts Explain the importance of information to the company and its understanding of.
Database Systems COMSATS INSTITUTE OF INFORMATION TECHNOLOGY, VEHARI.
Information Systems Security Computer System Life Cycle Security.
Prototyping: “The Design Process”. The Problem The design process begins when a solution to a problem is needed. At other times the engineer may change.
Karolina Muszyńska. Reverse engineering - looking at the solution to figure out how it works Reverse engineering - breaking something down in order to.
By Anthony W. Hill & Course Technology1 Common End User Problems.
Reverse Engineering Unit 3, Lesson 3 Explanation.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
China’s Reverse Engineering By SN Bennett. What is Reverse Engineering? Reverse engineering is the process of discovering the technological principles.
1.Identify the design problem to solve and to decide whether to address it. (ITEA, STL 11-M) 2.Refine a design by using prototypes and modeling to ensure.
Managing Marketing Information The Importance of Information Companies need information about their: Companies need information about their: –Customer.
Product Development Chapter 6. Hardware & Software Techniques Block diagram the system (Visio) Redundancy  Active: failure of one parallel component.
University of Illinois at Chicago ECE 396  Senior Design I 4  1 ECE 396 – Senior Design I Fall 2006 Semester PowerPoint presentation #4.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 20 Slide 1 Critical systems development 3.
Protecting Data Rights Under DoD Contracts October 14, 2009 NCMA Workshop Cape Canaveral Chapter Keith R. Szeliga Sheppard Mullin Richter & Hampton.
Back to the Basics The Ethical Aspect of Reverse Engineering.
Configuration Management and Change Control Change is inevitable! So it has to be planned for and managed.
Module 4: Systems Development Chapter 14: Design And Implementation.
1 CSCD 326 Data Structures I Software Design. 2 The Software Life Cycle 1. Specification 2. Design 3. Risk Analysis 4. Verification 5. Coding 6. Testing.
Reverse Engineering - Padma Dasari. Reverse Engineering Engineering is the profession involved in designing, manufacturing, constructing, and maintaining.
Assoc. Prof. Dr. Ahmet Turan ÖZCERİT.  What is engineer,  What is Computer Engineering  The topics in Computer Engineering You will learn: 2.
Ch7: Software Production Process. 1 Waterfall models  Invented in the late 1950s for large air defense systems, popularized in the 1970s  Main characteristics:
Reverse Engineering. Reverse engineering is the general process of analyzing a technology specifically to ascertain how it was designed or how it operates.
“Software reverse engineering involves taking an existing system for which source code or proper documentation is not available and attempting to recover.
A method for understanding product design. After this presentation you will be familiar with: Design concepts and scientific principles behind the working.
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
BY SAM.  Computer-aided design [CAD]  Computer-aided manufacture [CAM]  CAD/CAM systems  Computer-aided engineering (CAE) 1/17/2012 ICT on Engineering.
Reverse Engineering Dept. of I&CT, MIT, Manipal. Aspects To Be Covered Introduction to reverse engineering. Comparison between reverse and forward engineering.
Software Integrado Team # What is an Embedded software? Is a computer software which plays an integral role in the electronics it is supplied with.
DATA MANAGEMENT AND DATABASES. Data Management Data management is the process of controlling the information generated during a research project or transaction.
Sweet Problem Based Learning Reverse engineering Custom Cupcakes.
Engineering Design Process Selecting an idea – design and build Steps 3 and 4.
An introduction to Intellectual property protection TG © Copyright by Stevens Institute of Technology.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Tutorial 4 IT323.  Q1. As a software project manager in a company that specializes in the development of software for the offshore oil industry, you.
Documentation control
What is Reverse Engineering?
Software Maintenance.
Quality Management Perfectqaservices.
Chapter 6: Design of Expert Systems
Reverse Engineering Slide Deck
STEMCenter for Teaching & Learning™ Engineering byDesign™
STEMCenter for Teaching & Learning™ Engineering byDesign™
DESIGN CONCEPTS AND PROCESSES
Chapter 6 Reverse Engineering.
Reverse Engineering.
Introduction Software is becoming very expensive:
Product Disassembly.
REVERSE ENGINEERING Footer Text 1/1/2019.
STEMCenter for Teaching & Learning™ Engineering byDesign™
STEMCenter for Teaching & Learning™ Engineering byDesign™
The Basics of Information Systems
Foundations of Technology Reverse Engineering
Robotics & Engineering Academy TERRA Environmental Research Institute
The Basics of Information Systems
Presentation transcript:

Reverse engineering is the process of discovering the technological principles of a human made device, object or system through analysis of its structure, function and operation It often involves taking something (e.g., a mechanical device, electronic component, or software program) apart and analyzing its workings in detail to be used in maintenance, or to try to make a new device or program that does the same thing without using or simply duplicating (without understanding) the original.

Reverse engineering has its origins in the analysis of hardware for commercial or military advantage. The purpose is to deduce design decisions from end products with little or no additional knowledge about the procedures involved in the original production. The same techniques are subsequently being researched for application to legacy software systems, not for industrial or defense ends, but rather to replace incorrect, incomplete, or otherwise unavailable documentation. PURPOSE

InteroperabilityInteroperability. Lost documentation: Reverse engineering often is done because the documentation of a particular device has been lost (or was never written), and the person who built it is no longer available. Integrated circuits often seem to have been designed on obsolete, proprietary systems, which means that the only way to incorporate the functionality into new technology is to reverse-engineer the existing chip and then re-design it.Integrated circuits Product analysis. To examine how a product works, what components it consists of, estimate costs, and identify potential patent infringement. patent infringement Digital update/correction. To update the digital version (e.g. CAD model) of an object to match an "as-built" condition.CAD Security auditing. Acquiring sensitive data by disassembling and analyzing the design of a system component. [3] [3] Military or commercial espionage. Learning about an enemy's or competitor's latest research by stealing or capturing a prototype and dismantling it.espionage Removal of copy protection, circumvention of access restrictions.copy protection Creation of unlicensed/unapproved duplicates. Materials harvesting, sorting, or scrapping. [4] [4] Academic/learning purposes. Curiosity. Competitive technical intelligence (understand what your competitor is actually doing, versus what they say they are doing). Learning: learn from others' mistakes. Do not make the same mistakes that others have already made and subsequently corrected.

 REVERSE ENGINEERING OF MACHINES  REVERSE ENGINEERING OF SOFTWARE  REVERSE ENGINEERING OF PROTOCOLS  REVERSE ENGINEERING OF INTEGRATED CIRCUITS & SMART CARDS  REVERSE ENGINEERING FOR MILITARY APPLICATIONS