Reverse engineering, also known as reverse engineering, reverse engineering or reverse engineering, is the activity of the research object to determine its internal operation or manufacturing method

 

This analysis can target several objectives:

Understand how this object works so that you can use or modify it correctly Copy this object when planning and manufacturing methods cannot be obtained (usually legal and illegal activities. Analyze the object produced by competitors as part of competitive intelligence activities or detect potential patent infringement. According to the nature and purpose of the object, different methods and technologies are used. For physical images, the system can be disassembled to analyze its components to a certain extent. In electronic and computer science, this method can be research Black box method: the object to be studied is isolated, and the input and output of activities are determined. Then we try to determine the response of the system at the entrance according to the change of signal (s).

 

There are several examples of reverse engineering in the military field. For example, in the late 1940s, the Soviet Union built the Tupolev tu-4 bomber, which is actually a replica of the Boeing B-29 super fortress bomber This copy was reverse engineered from three B - 29s captured after the Soviet crash landing. This part is empty, not detailed or complete. Your help is welcome.

 

Reverse engineering physical objects

The principle of reverse engineering is to obtain the point cloud from the object surface for digital scanning or mechanical feeling. This point cloud is processed by surface reconstruction software, which allows to first establish a polygonal model (for machining, simulation and rapid prototyping) and then generate a NURBS surface. Exported to CAD software, digitally defined objects can be modified, analyzed and adapted to its environment and son architecture international.

 

What are the different reasons for using reverse engineering?

  • The original design was not adequately or adequately documented.
  • The original CAD model is not sufficient to support modifications and / or the current manufacturing process.
  • The original manufacturer no longer exists or produces products, but has requirements for products.
  • Worn or damaged parts without source of supply.
  • Strengthen the function.
  • Improved performance and / or product functionality.
  • Missing additional parts (spare parts).
  • Update outdated materials or outdated manufacturing processes.
  • Electronic reverse engineering

 
Computer reverse engineering

Reverse engineering also applies to software. This can be achieved by using analysis tools such as disassembler or decompiler, which is similar to debugging. Samba project is a typical example of reverse engineering. The team must figure out how Microsoft Windows operating system network resource sharing works without accessing the official technical specifications. So they have to find out. Software reverse engineering is often applied to data structures: in this case, it involves reverse recording physical data structures (aging applications) that are rarely or poorly recorded. We tried to rebuild one_ A data model from the physical structure of a file or table.

Software reverse engineering is becoming more and more popular with the hijacking of video game copyright protection. This activity is called cracking. When writing drivers for some peripheral devices (webcams, scanners, etc.), free software developers often find themselves forced to reverse engineer the drivers and find out how to talk by intercepting the exchange between chips and drivers. Use a chip_ Then there is the problem of simulating pilots, and then there is the problem of doing better (see Linux pilots in cyber camera SPCA, PwC, etc.). An example is designed for NVIDIA graphics cards or __ Nouveau project to produce free 3D drivers. Radeonhd, a similar project for ATI radeon HD graphics cards.

In cryptography, reverse engineering has many forms of cryptanalysis attacks. The goal is to extract secret information from the "black box" symbolizing the encryption process. These types of attacks are called bypass attacks. Reverse engineering is also considered to be behind the leakage of RC2 and RC4 algorithms posted on the Internet through SCI newsgroup. Crypt. Arcpour algorithm is also a clone of RC4.

 

Intermediate language courses

Semi compiled programming languages (compiled into binary code interpreted by virtual machines) such as Java and net make reverse engineering easier. Therefore, you can reverse engineer binary executables for the Java platform using the argouml program. For programs. Net, Microsoft standard provides ILdasm and decompiler

 

Reverse engineering as a defense

Malicious binary Research (rootkit) as part of computer attacks.

Study computer viruses to improve anti-virus software or provide eradication methods

Research and study the vulnerabilities in the software to improve its security

As a technical observation activity, reverse engineering is also a technical observation activity. It targets:

 

Competitive product research,

Understand the methods used by competitors,

Looking for suppliers,

Identify components to use

Cost estimates based on all or part of the above information,

Decompose the cost of the part by evaluating each component of the part, materials used, manufacturing time and method

Detect potential patent infringement committed or to be avoided by competitors.

PLEASE keep all discussions relevant to fashion, textiles, beauty products, or jewelry.

Follow the Fashion Industry Network Rules.

It is always a good time to review fabulous fashion.

 

Hot topics of possible interest:

  Thank you for using the Fashion Industry Network.  Have you helped another member today? Answer questions in the forum. It brings good luck.