Reverse Engineering
16,456 Followers
Recent papers in Reverse Engineering
Automated software engineering has long been a goal of arti cial intelligence. There has been slow but steady progress towards understanding the processes underlying program synthesis and modi cation. One signi cant observation that came... more
In a previous paper these authors presented a new mesh-growing approach based on the Gabriel 2-Simplex (G2S) criterion. If compared with the Cocone family and the Ball Pivoting methods, G2S demonstrated to be competitive in terms of... more
Foreign direct investment (FDI) can benefit innovation activity in the host country via spillover channels such as reverse engineering, skilled labor turnovers, demonstration effects, and suppliercustomer relationships. Using provincial... more
We present an efficient Hough transform for automatic detection of cylinders in point clouds. As cylinders are one of the most frequently used primitives for industrial design, automatic and robust methods for their detection and fitting... more
Abstract With the continuous development of the wireless technology, securing wireless sensor networks became more and more a crucial but also a demanding task. In this paper we propose a combined strategy that is meant to discover... more
In order to construct a 3D model from a collection of 2D images of an object, an energy function is defined between the object's images and corresponding images of an articulated mesh in three dimensions. Repeated adjustment of the mesh... more
Students engaged in systems engineering education typically lack experience and understanding of the multidisciplinary complexity of systems engineering projects. Consequently, students struggle to understand the value, rationale, and... more
In this paper, the procedure developed to calibrate a whole-field optical profilometer and the evaluation of the measurement performance of the system are presented. The sensor is based on the projection of structured light and on active... more
This report gives an overview of the work performed by the Programming Research Group as part of the European collaborative ESPRIT II REDO project (no. 2487). This work covered the areas of reverse-engineering: redocumentation and... more
This concept paper presents Deconstruction Kits as a means of creatively engaging learners in problem solving and critical thinking, skills that are applicable to all STEM disciplines. Deconstruction Kits, designed to promote learning... more
IT industry loses tens of billions of dollars annually from security attacks such as tampering and malicious reverse engineering. Code obfuscation techniques counter such attacks by transforming code into patterns that resist the attacks.... more
Historic Building Information Modelling (HBIM) is a novel prototype library of parametric objects, based on historic architectural data and a system of cross platform programmes for mapping parametric objects onto point cloud and image... more
One of the main challenges faced by today's developers is keeping up with the staggering amount of source code that needs to be read and understood. In order to help developers with this problem and reduce the costs associated with it,... more
This paper presents the activities performed to improve the aerodynamic performances of a two man bobsleigh. Performances during races depend on aerodynamic design and crew expertise. Bobsleigh shape design optimization has long been... more
In some recent papers it was shown that ZrO single films can be modeled using inhomogeneous models. A similar modeling 2 approach to analyze CeO layers has been used. Films have been produced using a standard reactive evaporation... more
Device Trees (DTs) provide the description of physical devices inside an embedded system hardware with node specifications. Model-driven development may be used for dealing with the difficulties encountered in DT development due to the... more
This study intends to conduct reverse engineering at mark recapitulation application at the Information Systems Department, Universitas Komputer Indonesia (UNIKOM). This research is the first step of the reengineering process in the mark... more
When the Application Programming Interface (API) of a framework or library changes, its clients must be adapted. This change propagation—known as a ripple effect—is a problem that has garnered interest: several approaches have been... more
ABSTRACT: A major problem in software maintenance is the lack of a well-documented source code in software applications. This has led to serious difficulties in software maintenance and evolution. In particular, for those developers who... more
Due to the benefits of cloud computing, many desktop applications have been migrated into the cloud. In order to program in the cloud, lots of IDEs are also moved into the cloud at recent years. Although online IDE can bring developers a... more
Safety critical software requires integrating verification techniques in software development methods. Software architectures must guarantee that developed systems will meet safety requirements and safety analyses are frequently used in... more
Systems are increasingly being constructed from off-the-shelf components acquired through a globally distributed, untrusted supply chain. The lack of trust in these components necessitates additional validation of the components before... more
Software architecture, as a vehicle for communication and reasoning about software systems and their quality, is becoming an area of focus in both the forward-and reverseengineering communities. In the past, we have attempted to unify... more
The aim of the study is to design, analysis and optimization of piston for a single cylinder four stroke over head valve (OHV) spark ignition engine. This paper used reverse engineering techniques, in order to obtain of an existing... more
The paper presents the application of non−modulation reflectance method for composition profiling of epitaxial Al x Ga 1-x As/GaAs structures. This non−destructive method is based on spectral measurements and theoretical reflectance... more
T he Internet's evolution over the past 30 years has been accompanied by the development of various network applications. These applications range from early text-based utilities such as file transfer and remote login to the more recent... more
This case study highlights activities performed during a system design effort undertaken by the Joint Tactical Radio System Handheld, Manpack and Small Form Fit Program. A modified waterfall model comprised of three cyclic, yet... more
This paper describes a process to reverse engineer structural and behavioural formal models of a GUI application by a dynamic technique, mixing manual with automatic exploration. The goal is to diminish the effort required to construct... more
3D imaging sensors for the acquisition of three dimensional (3D) shapes have created, in recent years, a considerable degree of interest for a number of applications. The miniaturization and integration of the optical and electronic... more
Reverse engineering is a process to extract designing knowledge from the use of any human-made by analysis its structure . Using this science in research is very common and the major difference of Reverse engineering with conventional... more
– The Android Operating System covers almost 80% of the smartphones market. However, being so successful and popular amongst its users, Android Platform may misbehave in spite of all the rigorous security mechanisms it can afford. In our... more
Jugaad innovation is entirely need based innovation, that means innovated and invented as and when required to satisfy an individual or a group's needs. Jugaad innovations are an outcome of creative brains. The word is originated in Hindi... more
Integrated circuits (ICs) are now designed and fabricated in a globalized multi-vendor environment making them vulnerable to malicious design changes, the insertion of hardware trojans/malware and intellectual property (IP) theft.... more
This paper presents novel emerging robotic technologies for space applications conceived by reverse engineering ideas from nature. Although plant and animal species have evolved in the terrestrial environment, we believe that there is... more
This paper presents a generic methodology for database reverse engineering comprising two main steps, namely Data structure extraction and Data structure conceptualization. The first process tries to elicit the physical data structures of... more
Cost reduction, light weighting, quality and safety are the basis for all design and development of automobile component manufacturing. Low cost with high quality components can be produced by proper material selection, material cost,... more
The concept of Reverse Engineering is used in many fields of IT every day, to name just a few: legacy compatibility, binary code patching, malware analysis, network protocols analysis, debugging or even rapid prototyping. Despite its... more
Reverse engineering (RE) is a domain of current interest where physical models are measured or digitised in order to obtain a virtual model. Currently, geometric models are rebuilt using geometric approaches. These models are generally... more
16th century ‘face to face’ persuasion scams adopted to letters, telephone, fax and Internet with the development of new communication technologies. In many of today’s fraud schemes phone numbers play an important role. Various... more
In this paper we will apply a generic database reverse engineering methodology to a case study. We will sketch a database reverse engineering methodology. Then, we will describe the DB- MAIN CASE tool and its reverse engineering... more
The aim of the study is to design, analysis and optimization of piston for a single cylinder four stroke over head valve (OHV) spark ignition engine. This paper used reverse engineering techniques, in order to obtain of an existing... more
The emergence of the Internet technology and the rapid growth of its applications have made the information available anywhere and anytime. Thus, most businesses run Web- based front-end databases and make a variety of services and... more