White Paper on Reverse Engineering

نویسنده

  • C Spencer Rugaber
چکیده

This paper motivates and describes a research program in the area of reverse engineering being w conducted at the Georgia Institute of Technology. Reverse engineering is an emerging interest area ithin the software engineering field. Software engineering itself is concerned with improving the pro-c ductivity of the software development process and the quality of the systems it produces. However, as urrently practiced, the majority of the software development effort is spent on maintaining existing o m systems rather than developing new ones. Estimates of the proportion of resources and time devoted t aintenance range from 50% to 80%[6]. The greatest part of the software maintenance process is devoted to understanding the system t a being maintained. Fjeldstad and Hamlen report that 47% and 62% of time spent on actual enhancemen nd correction tasks, respectively, are devoted to comprehension activities. These involve reading the documentation, scanning the source code, and understanding the changes to be made[12]. The implications are that if we want to improve software development, we should look at mainte-i nance, and if we want to improve maintenance, we should facilitate the process of comprehending exist ng programs. Reverse engineering provides a direct attack on the program comprehension problem. The process of understanding a program involves reverse engineering the source code. Chikofsky s and Cross[8] give the following definition. "Reverse enginering is the process of analyzing a subject ystem to identify the system's components and their interrelationships and create representations of the u system in another form or at a higher level of abstraction." The purpose of reverse engineering is to nderstand a software system in order to facilitate enhancement, correction, documentation, redesign, or 1 reprogramming in a different programming language. .2. Difficulties Reverse engineering is difficult. It is difficult because it must bridge different worlds. Of particular importance are bridges over the following five gaps. The gap between a problem from some application domain and a solution in some programming language. The gap between the concrete world of physical machines and computer programs and the abstract world of high level descriptions. The gap between the desired coherent and highly structured description of the system and the actual system whose structure may have disintegrated over time.-2-n The gap between the hierarchical world of programs and the associational nature of huma cognition. The gap between the bottom-up analysis of the source code and the top-down synthesis of the 1 description …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

White-Box Cryptography: Don't Forget About Grey Box Attacks

Despite the fact that all current scientific white-box approaches of standardized cryptographic primitives have been publicly broken, these attacks require knowledge of the internal data representation used by the implementation. In practice, the level of implementation knowledge required is only attainable through significant reverse engineering efforts. In this paper we describe new approache...

متن کامل

Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough

Although all current scientific white-box approaches of standardized cryptographic primitives are broken, there is still a large number of companies which sell “secure” white-box products. In this paper, we present a new approach to assess the security of white-box implementations which requires neither knowledge about the look-up tables used nor any reverse engineering effort. This differentia...

متن کامل

Considering chain to chain competition in forward and reverse logistics of a dynamic and integrated supply chain network design problem

In this paper, a bi-objective model is presented for dynamic and integrated network design of a new entrant competitive closed-loop supply chain. To consider dynamism and integration in the network design problem, multiple long-term periods are regarded during planning horizon, so that each long-term period includes several short-term periods. Furthermore, a chain to chain competition between t...

متن کامل

Towards Reverse-Engineering Black-Box Neural Networks

Many deployed learned models are black boxes: given input, returns output. Internal information about the model, such as the architecture, optimisation procedure, or training data, is not disclosed explicitly as it might contain proprietary information or make the system more vulnerable. This work shows that such attributes of neural networks can be exposed from a sequence of queries. This has ...

متن کامل

Reverse Engineering of RFID devices

This paper discusses the relevance and potential impact of both RFID and reverse engineering of RFID technology, followed by a discussion of common protocols and internals of RFID technology. The focus of the paper is on providing an overview of the different approaches to reverse engineering RFID technology and possible countermeasures that could limit the potential of such reverse engineering...

متن کامل

Software Reverse Engineering as a Sensemaking Task

Software reverse engineering involves analyzing computer program executables to understand their structure, functionality, and behavior. In this paper, common reverse engineering functions are decomposed to isolate the information-processing and sensemaking subtasks involved. This paper reviews the applicable literature on eliciting mental models of software reverse engineers. Based on the lite...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994