Reverse Engineering

نویسندگان

  • Chih-Wei Lu
  • William C. Chu
  • Chih-Hung Chang
  • Yeh-Ching Chung
چکیده

Software systems have become business-critical for many companies. These systems are usually large and complex. Some have evolved over decades and therefore are known as legacy systems. These legacy systems need to be maintained and evolved due to many factors, including error correction, requirements change, business rules change, structural re-organization, etc. A fundamental problem in maintaining and evolving legacy systems is to understand the subject system. Reverse engineering is the process of analyzing a subject system (a) to identify the system’s components and their interrelationships and (b) to create representations of the system in another form or at a higher level of abstraction. In this chapter, we will discuss the problems, process, technologies, tools and future directions of reverse engineering.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reverse engineering in cad pdf

This chapter introduces readers to the term reverse engineering RE, and to the. Of obtaining a geometric CAD model from 3-D points acquired by scanning.Reverse engineering RE has many meanings to many different people. Automation of forward engineering through CAD and CAM technologies.exactly is reverse engineering particularly in the context of CAD CAM and how this can. One should know what is...

متن کامل

ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow

Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...

متن کامل

Video Games and Reverse Engineering: Before and After the Digital Millennium Copyright Act

INTRODUCTION ...................................................................................210 I. THE INTELLECTUAL PROPERTY CONTEXT OF REVERSE ENGINEERING..............................................................................212 A. Intellectual Property Law and Reverse Engineering ............212 B. No Coherent Treatment of Reverse Engineering.................215 II. REVERSE ENGINEE...

متن کامل

Considering chain to chain competition in forward and reverse logistics of a dynamic and integrated supply chain network design problem

In this paper, a bi-objective model is presented for dynamic and integrated network design of a new entrant competitive closed-loop supply chain. To consider dynamism and integration in the network design problem, multiple long-term periods are regarded during planning horizon, so that each long-term period includes several short-term periods. Furthermore, a chain to chain competition between t...

متن کامل

Experiences Reverse Engineering Manually

Better understanding manual reverse engineering can make it and any associated systems reengineering more effective. We reverse engineered a version of a system (referred to as "BOS/X") in support of a broader reengineering effort. System reengineering goals and other circumstances dictated a focused, limited duration, manual reverse engineering exercise. This presented an opportunity to study ...

متن کامل

The Law and Economics of Reverse Engineering

II. REVERSE ENGINEERING IN TRADITIONAL MANUFACTURING INDUSTRIES.....................................................................................1582 A. A Legal Perspective on Reverse Engineering ..........................1582 B. An Economic Perspective on Reverse Engineering .................1585 C. Anti-Plug-Mold Laws: An Exception to Reverse Engineering Rules?................................

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001