{"title":"制定防御技术以防止被禁止的逆向工程的威胁","authors":"Asmaa M. Alhakimy, K. Rajadurai, M. Ravi","doi":"10.1109/CTIT.2011.6107939","DOIUrl":null,"url":null,"abstract":"Reverse engineering (RE) was invented primarily when the process of software engineering (SE) gained less interest because of difficulty. It was mainly used when software is developed, and the developer is no longer available. Therefore the only communication method was available is reverse engineering. However this amazing process has drifted to a different direction where reverse engineers or hackers have found their way to break into any closed source code, and been able to edit it and resell it again which cost the original author a big loss. Anti-reverse engineering techniques have appeared to stop this illegal process, some were successful and some are not. This research will discuss the level of success of these techniques. Present and customize the proposed technique base on a critical formularized and normalized analysis that is done on data collected globally involving software engineers and reverse. To support the analysis an experiment is conducted to see the ability to reverse engineer small and medium systems.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Formulating a defensive technique to prevent the threat of prohibited reverse engineering\",\"authors\":\"Asmaa M. Alhakimy, K. Rajadurai, M. Ravi\",\"doi\":\"10.1109/CTIT.2011.6107939\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Reverse engineering (RE) was invented primarily when the process of software engineering (SE) gained less interest because of difficulty. It was mainly used when software is developed, and the developer is no longer available. Therefore the only communication method was available is reverse engineering. However this amazing process has drifted to a different direction where reverse engineers or hackers have found their way to break into any closed source code, and been able to edit it and resell it again which cost the original author a big loss. Anti-reverse engineering techniques have appeared to stop this illegal process, some were successful and some are not. This research will discuss the level of success of these techniques. Present and customize the proposed technique base on a critical formularized and normalized analysis that is done on data collected globally involving software engineers and reverse. To support the analysis an experiment is conducted to see the ability to reverse engineer small and medium systems.\",\"PeriodicalId\":233698,\"journal\":{\"name\":\"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CTIT.2011.6107939\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CTIT.2011.6107939","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Formulating a defensive technique to prevent the threat of prohibited reverse engineering
Reverse engineering (RE) was invented primarily when the process of software engineering (SE) gained less interest because of difficulty. It was mainly used when software is developed, and the developer is no longer available. Therefore the only communication method was available is reverse engineering. However this amazing process has drifted to a different direction where reverse engineers or hackers have found their way to break into any closed source code, and been able to edit it and resell it again which cost the original author a big loss. Anti-reverse engineering techniques have appeared to stop this illegal process, some were successful and some are not. This research will discuss the level of success of these techniques. Present and customize the proposed technique base on a critical formularized and normalized analysis that is done on data collected globally involving software engineers and reverse. To support the analysis an experiment is conducted to see the ability to reverse engineer small and medium systems.