“Software reverse engineering involves taking an existing system for which source code or proper documentation is not available and attempting to recover.

Slides:



Advertisements
Similar presentations
Long-Term Preservation. Technical Approaches to Long-Term Preservation the challenge is to interpret formats a similar development: sound carriers From.
Advertisements

Sixteen Questions About Software Reuse William B. Frakes and Christopher J. Fox Communications of the ACM.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Systems Software.
Computer Literacy and ICT Engineers 橋本 義平 Hashimoto Yoshihei (情報工学)
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
ICT Ethics 2 ICT 139.
Digital Rights Management © Knowledge Books & Software, 2012.
Chapter 17 Controls and Security Measures
Human Language Technologies. Issue Corporate data stores contain mostly natural language materials. Knowledge Management systems utilize rich semantic.
Social and Ethical Issues Rights and responsibilities of Software Developers.
Software Design & Development Year 12. Structure of the Course Development and Impact of Software Solutions Development and Impact of Software Solutions.
Reverse Engineering When is it the most cost effective? Raymond Utz.
Lesson-10 Information System Building Blocks(2)
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Partial Automation of an Integration Reverse Engineering Environment of Binary Code Author : Cristina Cifuentes Reverse Engineering, 1996., Proceedings.
Software Protection & Scope of the Right holder Options for Developing Countries Presentation by: Dr. Ahmed El Saghir Judge at the Council of State Courts.
Development and Impact of Software Solutions Social and ethical issues.
Professional Ethics for Computer Programmers
The Re-engineering and Reuse of Software
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Trying to like a boss… REVERSE ENGINEERING. WHAT EVEN IS… REVERSE ENGINEERING?? Reverse engineering is the process of disassembling and analyzing a particular.
© SERG Reverse Engineering (Introduction to Binary Reversing) Software Reversing Engineering (a.k.a. Reversing) Spiros Mancoridis.
Software Construction and Evolution - CSSE 375 Reverse Engineering Tools and Techniques Shawn & Steve Left – Reengineering from the competition can be.
Karolina Muszyńska. Reverse engineering - looking at the solution to figure out how it works Reverse engineering - breaking something down in order to.
Reverse Engineering Unit 3, Lesson 3 Explanation.
Today discussion Intellectual property. What exactly is intellectual property ? Types of intellectual property. Patents, Trademarks and Designs. The ”BIG.
Binary Auditing Geller Bedoya Michael Wozniak. Background  Binary auditing is a technique used to test the security and discover the inner workings of.
MIDTERM EXAM REVIEW SHEET. Review Sheet Where (what legal places) can you share digital information via computers? How are computer files shared with.
CS266 Software Reverse Engineering (SRE) Reversing and Patching Java Bytecode Teodoro (Ted) Cipresso,
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 17 Software as Intellectual Property.
An Introduction to Software Engineering. Communication Systems.
Reverse engineering is the process of discovering the technological principles of a human made device, object or system through analysis of its structure,
Back to the Basics The Ethical Aspect of Reverse Engineering.
Final Exam Review. History of Computing Know trends No dates.
17 April Reverse Engineering Ethics Privacy Introduction.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Black Box Testing : The technique of testing without having any knowledge of the interior workings of the application is Black Box testing. The tester.
 Programming - the process of creating computer programs.
Language Implementation Methods David Woolbright.
And the technology’s effect on consumer rights. What is DRM?  Defined by Encyclopedia of Multimedia as “technology [that] offers the ability to control.
Why? Software Engineers don’t communicate very well…
E-information and Copyright in Botswana: the Library Exception By KGOMOTSO F. RADIJENG Law Librarian (University of Botswana)
Reverse Engineering. Reverse engineering is the general process of analyzing a technology specifically to ascertain how it was designed or how it operates.
Legal and Ethical Issues in Computer Security Csilla Farkas
CISB 412 Social and Professional Issues Understanding Intellectual Property.
Reverse Engineering Dept. of I&CT, MIT, Manipal. Aspects To Be Covered Introduction to reverse engineering. Comparison between reverse and forward engineering.
Friday, 23 August 2013 Session Work out Presented By: Abhijit Pal.
Ethics Self Imposed Right and Wrong Behavior Described as:
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Sebastián Álvarez Henao.. It refers to all physical parts of a computer system; its components are: electrical, electronic, electromechanical and mechanical.
Software Reverse Engineering Binary analysis: concepts, methods and tools. Catalin Patulea Mar 5, 2008.
Contents What is Reverse Engineering (RE)? Why do we need Reverse Engineering? Scope and Tasks of Reverse Engineering Reverse Engineering Tools Reverse.
Customer Relationship Management Software A proposal by Virtual Dimensions ©Copyright Virtual Dimensions May-2010.
Chapter 7: Software Engineering
Legal challenges related to software vulnerability disclosure
Chapter 7: Software Engineering
Environment Assessment
KrypC Technologies Accelerated Blockchain Adoption.
Reverse Engineering Slide Deck
Software Maintenance
William Hackett & Co. Solicitors
What is Digital Right Management’s Role in Modern Education System’s Play? —A Comparative Research of DRM System’s Influence in.
Chapter 7 Software Engineering.
Re- engineeniering.
Week 10 Systems Development
Presentation transcript:

“Software reverse engineering involves taking an existing system for which source code or proper documentation is not available and attempting to recover details regarding its design and implementation.” Eldad Eilam Alex Summer Dennis Crenshaw David Williams Avery Scott

 Integration of legacy systems with new technology  Lost documentation or source code  Corporate competition  Interoperability of heterogeneous software systems  To gain knowledge and understanding of the process of software engineering

 Decompilation  Map binary code to a high-level language  Disassembly  Map binary code to assembly language  Clean room design  Black box approach

 Interactive Disassembler (IDA)  Utilize developer input to aid disassembly  Logic Analyzer  Viewing software processes at the hardware level  Specific Tools  dbg, OllyDbg

 Obfuscation  Purposely over complicating source code  Code Morphing  Translating to an intermediate language  Digital Rights Management (DRM)  Media encryption incorporated into hardware

 Contract law  End user license agreement (EULA)  Copyright law  Reverse engineering the code constitutes an unauthorized copy  Software Patents  Untested in court  May prove to be a legal stumbling block

“Copies of software should be made only with proper authorization. Unauthorized duplication of materials must not be condoned.” “…compliance must be balanced with the recognition that sometimes existing laws and rules may be immoral or inappropriate and, therefore, must be challenged.” ACM – Code of Ethics