Back to the Basics The Ethical Aspect of Reverse Engineering.

Slides:



Advertisements
Similar presentations
Executive Perspective for Scientists & Engineers (EPSE) A Real World Look at IP Infringement Randall K. Broberg, Esq. April 8, 2013.
Advertisements

Software: To Patent or Not? Jeffrey P. Kushan Powell, Goldstein, Frazer & Murphy, LLP.
Software patents, innovation and competition policy Rishab Aiyer Ghosh & Luc Soete MERIT, Universiteit Maastricht.
Case study Engineering Ethics Mahmoud Darawsheh. Psystar corporation  Psystar Corporation was a company based in Florida, owned by Rudy and Robert Pedraza.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Legal Issues in Software CS 415, Software Engineering II Mark Ardis, Rose-Hulman Institute April 11, 2003.
Legal and Ethical Issues in Computer Security
Ethical and Social Issues. Ethics Principles of right and wrong used by individuals as free moral agents to guide behavior.
Intellectual Property An intangible asset, considered to have value in a market, based on unique or original human knowledge and intellect. Intellectual.
Intellectual Property Boston College Law School March 19, 2008 Software – Copyright – Fair Use.
Copyright Law Boston College Law School February 25, 2003 Rights - Reproduction, Adaptation.
Game March 22, 2005Ashley Irvin/ Copyright Copyright and Plagiarism for Students Exploring the world of copyright and plagiarism.
CptS 401 Adam Carter. Quiz Question 1 According to the book, it is important to legally protect intellectual property for the following reason(s): A.
CS 501: Software Engineering Fall 2000 Lecture 7 Management II Business and Legal Aspects of Software Engineering.
CHAPTER Section 16.1 Legal Issues Section 16.2 Insurance Protecting Your Business.
Intellectual Property Rights: Protection or Monopolization?
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
COPYRIGHT LAW 2002 Professor Fischer CLASS 27: TECHNOLOGICAL PROTECTION MEASURES, REMEDIES.
Vatera.hu Notice and takedown (NTD) Protocol Gergely SzékelyJanuary 12, 2009 ICTrain 2009 eCommerce Day.
Computer Ethics.
MSE602 ENGINEERING INNOVATION MANAGEMENT
Legal and Ethical Issues in Computer Security Csilla Farkas
School Law and the Public Schools: A Practical Guide for Educational Leaders, 5e © 2012 Pearson Education, Inc. All rights reserved. Chapter 11 The Instructional.
Karolina Muszyńska. Reverse engineering - looking at the solution to figure out how it works Reverse engineering - breaking something down in order to.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
 You will face ethical dilemmas in your career – count on it!  Your decisions will affect: ◦ your professional reputation. ◦ your employability. ◦ the.
Legal and Ethical Issues in Computer Security
1 Digital Rights Management Dissenting Argument: Users of Digital Media should obey digital rights management systems to guarantee the integrity and protect.
LEE BURGUNDER LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed. LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed.
… concern the legal ownership and use of intellectual property, such as software, music, movies, data, and information. Links: Video: Too Much Copyright.
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
CS 501: Software Engineering Fall 1999 Lecture 19 Management II Business and legal aspects of software engineering.
University of Illinois at Chicago ECE 396  Senior Design I 4  1 ECE 396 – Senior Design I Fall 2006 Semester PowerPoint presentation #4.
Reverse engineering is the process of discovering the technological principles of a human made device, object or system through analysis of its structure,
Internet and Intellectual Property  University of Palestine  Eng. Wisam Zaqoot  Feb 2010 ITSS 4201 Internet Insurance and Information Hiding.
Litigating Copyright Infringement Claims Related to Competing Software Applications Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
The Ethics of Emulation David Gale February 24 th.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Reverse Engineering - Padma Dasari. Reverse Engineering Engineering is the profession involved in designing, manufacturing, constructing, and maintaining.
Trade Secrets Basics Victor H. Bouganim WCL, American University.
Tony Malatanos. Focal Points  What is reverse engineering?  Reasons Legit Malicious  Legality  Morality  Clean Room Design  Example: ReactOS.
COPYRIGHT LAW 2004 Columbus School of Law The Catholic University of America Prof. Fischer CLASS of April
Intellectual property (cont.) 1. Software as intellectual property 2  The law concerning software is not clear and is steal being formulated  In USA.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
Installing interoperability in information systems How patent and copyrights affect the development of interoperable information systems.
Digital Millennium Copyright Act (DMCA) The Digital Millennium Copyright Act is a United States copyright law that was signed into law by Bill Clinton.
“Software reverse engineering involves taking an existing system for which source code or proper documentation is not available and attempting to recover.
4/17: Ethical & Social Issues in IS
Legal and Ethical Issues in Computer Security Csilla Farkas
Ethics CSE 591 – Security and Vulnerability Analysis Spring 2015 Adam Doupé Arizona State University
Computer Technology Timpview High School
CISB 412 Social and Professional Issues Understanding Intellectual Property.
CHAPTER 8 Legal, Privacy and Ethical Issues in Computer Security (c) by Syed Ardi Syed Yahya Kamal, UTM
CPS Digital Copyright. CPS Copyright US Constitution (Article I, Section 8, Clause 8): “To promote the Progress of Science and useful.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
INFLUENCE OF GOVERNMENT ON MARKETING
Intellectual Property and Cyber Piracy
Ethics CSE 591 – Security and Vulnerability Analysis Spring 2017
A Gift of Fire Third edition Sara Baase
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Legal and Ethical Issues in Computer Security
Reverse Engineering Slide Deck
Intellectual Property Rights
Chapter 9 Internet Law and Intellectual Property
Ethics CSE 545 – Software Security Spring 2018 Adam Doupé
Intellectual Property
Intellectual Property
Chapter # 6 Intellectual Property
Presentation transcript:

Back to the Basics The Ethical Aspect of Reverse Engineering

What Is Reverse Engineering?

“The process of analyzing a system's code, documentation, and behavior to identify its current components and their dependencies to extract and create system abstractions and design information. The subject system is not altered; however, additional knowledge about the system is produced.” –Software Technology Review, 2/26/00

Why Reverse Engineering? Produce compatible product Produce competing product Academic use Hacking/cracking

Why Reverse Engineering? Specifically: Discern specifications Ensure compatibility Understand program operation Understand solutions to programming problems Understand concepts

What’s Wrong With Reverse Engineering? Copyright violation Temporary copies of code in RAM Copying portions of code (BIOS, ROMs) Copying “non-literal” elements (look and feel) Both literal and non-literal parts of software protected by law

What’s Wrong With Reverse Engineering? Patent infringement Intermediate copies may violate patents Hacking/cracking Exploit security holes Disable copy-protection Modification and redistribution of copyrighted material

Ethical Considerations Consider purpose of reverse engineering Fair use vs. Unethical/criminal use Healthy competition vs. Monopoly

US Law Digital Millennium Copyright Act Circumventing anti-piracy controls is illegal Hardware and software for unauthorized duplication is illegal Cracking is legal for assessing product security and compatibility Cracking is legal for academic use

Specific Cases AOL vs. Microsoft: the instant messenger wars Microsoft reverse-engineered AOL Instant Messenger to provide compatibility AOL repeatedly changed protocols In similar incident, AOL reportedly asked Prodigy to license IM protocol Did either company act ethically?

Specific Cases Sony vs. Connectix Playstation emulator for Macintosh Sony claimed copyright infringement, damage to Playstation name Initial injunction against Connectix recently overturned Is Connectix capitalizing on Playstation name?

The “Newspaper Test” Texas Instruments’ solution: the Ethics Quick Test Is the action legal? Does it comply with our values? If you do it, will you feel bad? How will it look in the newspaper? 2/27/00

TI’s stance “Reverse engineering is a very common, accepted, and expected practice in our business world today. When we put a product on the market, we assume that it will be reverse engineered by competitors and others. Once it is on the market, there are few secrets left…perhaps some in our manufacturing process. That is one reason we so vigorously defend infringements on our patents. But this philosophy allows reverse engineering to pass the last three quick tests” 2/27/00

Summary Reverse engineering can be used for ethical and non-ethical purposes Use newspaper test to evaluate Laws protect against improper use