0 évaluation0% ont trouvé ce document utile (0 vote)
32 vues4 pages
O #he Reverse Engineering process allows researchers to understand how a product works more comprehensively than y only oserving it. O %e can use to evaluating our own product to know and understand its limitations. O RE is used to transform out of date products into useful ones y adapting them to new systems, technologies and stages.
O #he Reverse Engineering process allows researchers to understand how a product works more comprehensively than y only oserving it. O %e can use to evaluating our own product to know and understand its limitations. O RE is used to transform out of date products into useful ones y adapting them to new systems, technologies and stages.
O #he Reverse Engineering process allows researchers to understand how a product works more comprehensively than y only oserving it. O %e can use to evaluating our own product to know and understand its limitations. O RE is used to transform out of date products into useful ones y adapting them to new systems, technologies and stages.
We can use Reverse Engineering for following purposes:
o It is used to analyze a technology specifically to determine how it was designed or
how it operates. o Reverse engineering creates a different implementation with the same functionality for the product. o It is frequently a key part of the scientific methods and technological developments. o It is the process of studying the design principles of system or product as part of an education in engineering. o Reverse Engineering is used to understand the data, for example, internal data structures (i.e. definition of classes of o!ects" record structures, files, lists etc. o Reverse engineering (RE" is used to understand how a product works more comprehensively than y only oserving it. o It is used to know the dataase structure o It is also used for code restructuring that is accomplished y analyzing the source code using restructuring tool. o It is often used for data restructuring. o #he reverse engineering process allows researchers to understand oth how a program works and also what aspects of the program contriute to its not working or its malfunctioning. o It helps to inspect and correct errors and restrictions and constraints in our programs o $or two or more systems or products it is used to make the systems compatile and synchronized for each other that they could share data and resources to work together. o %e can use to evaluating our own product to know and understand its limitations. o %e can determine whether someone else has literally copied elements of our own technology and techniques. o RE is used to transform out of date products into useful ones y adapting them to new systems, technologies and stages. o It can also e used to creating documentation for the operation and design of a product whose maker is unresponsive or out of reach for the customer that is actually the owner of that product (e.g. software application". o Reverse engineering gives the asis of reengineering of our product i.e. old user interfaces those need to e redeveloped. o If are trying to learn aout some system that could e an operating system in that case we have to closely analyze the product it functionality, structure and it consisting files (data" then we could e in a position to produce reverse engineering. o If we are allowed to study some companies &eneral 'edger system, we have to analyze the existing system, its ase line, structure, functions and features etc then we can e ale to generate reverse engineering. (owever, if we are competitors of the same farm then they may not allow us to study their system. o In reverse engineering, researcher gathers the technical data necessary for the documentation of the operation of a technology. o In black box reverse engineering, systems are oserved without examining internal structure, while in white box reverse engineering the inner workings of the system are inspected. o Reverse engineering software and researchers are ale to examine the strength of systems and identify their weaknesses in terms of performance, security, and interoperaility. o Independent manufacturers can participate in a competitive market that rewards the improvements made on leading products. $or example, security audits, which allow users of software to etter, protect their systems and networks y revealing security flaws. #he creation of etter designs and the interoperaility of existing products often egin with reverse engineering )aking products and systems compatile so they can work together or share data *nderstanding how a product works more comprehensively than y merely oserving it Investigating and correcting errors and limitations in existing programs. Reverse engineering is also used by businesses to bring existing physical geometry into digital product development environments, to make a digital 3D record of their own products or assess competitors' products. It is used to analye, for instance, how a product works, what it does, what components it consists of, estimate costs, identify potential patent infringement, etc. Reverse engineering is often used by military in order to copy other nations' technology, devices or information, or parts of which, have been obtained by regular troops in the fields or by intelligence operations. !ther purposes of reverse engineering include security auditing, removal of copy protection "#cracking#$, circumvention of access restrictions often present in consumer electronics, customiation of embedded systems "such as engine management systems$, in%house repairs or retrofits, enabling of additional features on low%cost #crippled# hardware "such as some graphics card chipsets$, or even mere satisfaction of curiosity. Reverse engineering is also used by businesses to bring existing physical geometry into digital product development environments, to make a digital 3D record their own products or assess competitors' products. It is used to analye, for instance, how a product works, what it does, what components it consists of, estimate costs, identify potential patent infringement, etc. Reverse engineering is also used to check if some network service may be exploited via network. What stages are involved in the reverse engineering process? Identifying the product or component which will be reverse engineered In the first stage in the process, sometimes called +prescreening,+ reverse engineers determine the candidate product for their pro!ect. ,otential candidates for such a pro!ect include singular items, parts, components, units, suassemlies, some of which may contain many smaller parts sold as a single entity. Observing or disassembling the information documenting how the original product works #he second stage, disassemly of the original product, is the most time-consuming aspect of the pro!ect. In this stage, reverse engineers attempt to construct a characterization of the system y accumulating all of the technical data and instructions of how the product works. Implementing the technical data generated by reverse engineering in a replica or modified version of the original In the third stage of reverse engineering, reverse engineers try to verify that the data generated y disassemly is an accurate reconstruction the original system. Engineers verify the accuracy and validity of their designs y testing the system, creating prototypes, and experimenting with the results. Creating a new product and perhaps introducing it into the market. #he final stage of the reverse engineering process is the introduction of a new product into the marketplace. #hese new products are often innovations of the original product with competitive designs, features, or capailities. #hese products may also e adaptations of the original product for use with other integrated systems, such as different platforms of computer operating systems. .ften different groups of engineers perform each step separately, using only documents to exchange the information learned at each step. #his is to prevent duplication of the original technology, which may violate copyright. /y contrast, reverse engineering creates a different implementation with the same functionality.