Title :
Formulating a defensive technique to prevent the threat of prohibited reverse engineering
Author :
Al-Hakimy, Asma´a Mahfoud ; Rajadurai, Kesava Pillai ; Ravi, Muhammad Ibrahim
Author_Institution :
Coll. of Technol. & Innovation Technol., Asia Pacific Univ., Kuala Lumpur, Malaysia
Abstract :
Reverse engineering (RE) was invented primarily when the process of software engineering (SE) gained less interest because of difficulty. It was mainly used when software is developed, and the developer is no longer available. Therefore the only communication method was available is reverse engineering. However this amazing process has drifted to a different direction where reverse engineers or hackers have found their way to break into any closed source code, and been able to edit it and resell it again which cost the original author a big loss. Anti-reverse engineering techniques have appeared to stop this illegal process, some were successful and some are not. This research will discuss the level of success of these techniques. Present and customize the proposed technique base on a critical formularized and normalized analysis that is done on data collected globally involving software engineers and reverse. To support the analysis an experiment is conducted to see the ability to reverse engineer small and medium systems.
Keywords :
reverse engineering; software engineering; RE; SE; closed source code; defensive technique formulation; prohibited reverse engineering; software engineering; Anti-Reverse Engineering; DMCA; Digital Copyrights; Legal Aspects; Piracy; Reverse Engineering; Software Protection;
Conference_Titel :
Current Trends in Information Technology (CTIT), 2011 International Conference and Workshop on
Conference_Location :
Dubai
Print_ISBN :
978-1-4673-0097-1
Electronic_ISBN :
978-1-4673-0096-4
DOI :
10.1109/CTIT.2011.6107939