... absolutely. Most
of the widely publicized reverseengineering cases at the time of this writing did not occur
with Java products, but here’s an excerpt from a Java vendor (DataDirect Technologies):
ROCKVILLE, ... from the Internet or books that cover
these topics in detail. Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering
is about extreme techniques that punch through the commonly ... Brief 147
15 Replacing and Patching Core Java Classes 149
Why Bother? 149
Patching Core Java Classes Using the Boot Class Path 150
Example of Patching
java. lang.Integer 151
Quick Quiz 153
In...
... performance of
reverse engineering tasks. An experimental environment called Shimba has been built to support
reverse engineering of Java software systems. The static information is extracted from Java ... metrics 17
2.2.3 Supporting re -engineering and round-trip -engineering 19
2.2.4 Other tools facilitating reverseengineering 21
2.2.5 Summary 22
3 Modeling with UML 23
3.1 Class diagrams 25
3.2 ... would probably promote the reverseengineering task better.
2.1.2 A set of different views
Figure 2.2 shows the source code of an example Java program. When reverseengineering the ex-
ample program,...
... performance of
reverse engineering tasks. An experimental environment called Shimba has been built to support
reverse engineering of Java software systems. The static information is extracted from Java ... would probably promote the reverseengineering task better.
2.1.2 A set of different views
Figure 2.2 shows the source code of an example Java program. When reverseengineering the ex-
ample program, ... In static
reverse engineering, abstract high-level components to be found and constructed might represent
subsystems or other logically connected software artifacts. In dynamic reverse engineering, ...
... the reverse
engineers who actually do the research we would never know where the problems are.
There are some trends in the computer industry now that could eliminate the
benefits reverseengineering ... missing
from the PE format is an intermediate page lookup table.
Chapter 1: Introduction to ReverseEngineering
14
Consider the case where you buy a program and you install it in your PC, ... see the IMAGE_DIRECTORY_ENTRY_xxx #define's
in WINNT. H.
Chapter 1: Introduction to ReverseEngineering
9
by opening up the hood and seeing how things really work. Companies do not...
... xxvii
ReverseEngineering and Low-Level Software
Before we get into the various topics discussed throughout this book, we
should formally introduce its primary subject: reverse engineering. Reverse
engineering ... this
journey. Just like software engineering, software reverseengineering is a
purely virtual process, involving only a CPU, and the human mind.
Software reverseengineering requires a combination ... refers to scientific research as reverse engineering, simply because no
one knows for sure whether or not nature was ever engineered.
In the software world reverseengineering boils down to taking...
... knowledge
available about the program to be modified. In this respect, reverse engineer-
ing techniques are a useful support. Reverseengineering tools provide useful
high level information about the ... "a")
Contents
Foreword
XI
Preface
XIII
1
2
3
Introduction
1.1
1.2
1.3
1.4
1.5
1.6
1.7
Reverse Engineering
The Object Flow Graph
2.1
2.2
2.3
2.4
2.5
2.6
2.7
Abstract Language
2.1.1
2.1.2
Declarations
Statements
Object ... time, and are typically due to a wrong type assumed for
contained objects. Moreover, they make reverseengineering a difficult task. In
fact, interclass relationships, such as associations and dependencies,...
... records to be stored in the
DUT.
3. ReverseEngineering an Automotive
Mechatronic System
The term “ reverseengineering has its origin in the
mechanical engineering and describes in its original
meaning ... EJ, Cross JH II: ReverseEngineering and Design Recovery: A
Taxonomy. IEEE Software, IEEE Computer Society 1990, 13-17.
19. Cifuentes C, Fitzgerald A: The legal status of reverseengineering of
computer ... reuse
Thesetargets,thathaveoriginallybeendefinedfor
software reverse engineering, can also be transferred to
a certain extent to the reverseengineering of automotive
mechatronic systems and hence...
... computed with respect to ≺
i
.
Examples and results
Reverse engineering of the yeast cell cycle
We applied the PPDS method to the reverse engineering
of the gene regulatory network of the cell ... algorithm to
several other reverseengineering methods. In [40], Can-
tone et al. built in S. cerevisiae a synthetic network for
in vivo “benchmarking” of reverse- engineering and mod-
eling a ... 2011:1
http://bsb.eurasipjournals.com/content/2011/1/1
Page 5 of 13
Reverseengineering PDSs
Laubenbacher and Stigler’s reverse- engineering method
[34]firstconstructsthesetofallPDSsthatfitthegiven
discretiz...
... is
possible [1]. Therefore reverseengineering can be considered
as an intermediate step from bioinformatics to systems
biology.
The basic assumption of most reverseengineering algo-
rithms is ... for
incorporation in reverseengineering analysis. Therefore,
gene expression profiles are most widely used as input for
these algorithms. Probably this will change in future reverse
engineering research.
... network and data generator GeNGe
[22]. A discretization step is followed if required by the
reverse engineering application internally, for example, by
DBN with a quantile discretization.
In a...
... using oracle attacks. In Section 4, we show re-
sults for reverse- engineering a normalized correlation detec-
tor. We conclude that reverse- engineering a watermark de-
tector is possible, although ... pages
doi:10.1155/2007/43034
Research Article
Reverse- Engineering a Watermark Detector Using an Oracle
Scott Craver, Idris Atakli, and Jun Yu
Department of Electrical and Computer Engineering, Binghamton University, ... optimal growth rate depends
on both cone angle and dimension, both of which are un-
knowns to the reverse- engineering.
The growth rate of a noise snake is thus exponential in
the number of queries....
... tools for software quality assurance, among which a reverse engineering
tool.
The algorithms described in this book deal with the reverseengineering of
the following diagrams:
18
1
Introduction
State ... cases can
be derived from the generated UML diagrams. In this way, the system as
implemented will be verified against the system as specified. Without the
UML diagrams, extracted from the code, ... likely be only in the
source and there will be no other means of regaining it other than through
reverse engineering.
Trento, Italy, July 2004
Benevento, Italy, July 2004
Harry Sneed
Aniello Cimitile
...