Industrial Engineering and Strategic Management

Industrial Engineering and Strategic Management

The Essence and Challenges of Reverse Engineering

Document Type : Regular Article

Author
Department of Scientific-Theoretical Problems of Software Engineering and Intelligent Software Systems, Institute of Information Technology, Baku, Azerbaijan
Abstract
This paper studies the essence, challenges, etc. of reverse engineering. It explores how the program works with the help of reverse engineering, what data it uses, where and what it sends, as well as what vulnerabilities it has. Through reverse engineering, it is possible to understand how a program works, what data it uses, where and what it sends, as well as the program's weaknesses and how it reacts in the event of a crash. All this will help to improve the product and defeat competitors. The process of reverse engineering may seem simple; however, it is an illusion. Even experienced reverse engineers can analyze the same program for months. And it is not a fact that it will be possible to completely decrypt it. The paper also highlights the jobs reverse engineering is currently used for, and describes the procedure for using the disassembler, providing examples of the areas where reverse engineering is beneficial. It presents the exact ways in which reverse engineering occurs.

Highlights

  • Highlights the jobs reverse engineering is currently used for
  • Describes the procedure for using the disassembler, providing
  • Examples of the areas where reverse engineering
  • It presents the exact ways in which reverse engineering occurs

Keywords

Subjects


[1]     Ayoshin IT. Reverse engineering of a software product using IDA PRO. Curr. Probl. Aviat. Astronaut. 3. Proceeding VII Int. Sci. Pract. Conf., Russia: Reshetnev Siberian State University of Science and Technology; n.d., p. 809–945.
[2]     Kaspersky C, Rocco E. The art of disassembly. St. Petersburg: BHV-Petersburg; 2008.
[3]     Dang B, Gazet A, Bachaalany E. Practical reverse engineering: x86, x64, ARM, Windows kernel, reversing tools, and obfuscation. John Wiley & Sons; 2014.
[4]     Reverse Engineering n.d.
[5]     Cifuentes C. Reverse engineering and the computing profession. Computer (Long Beach Calif) 2001;34:167–8.
[6]     Hess B. What Is Reverse Engineering and How Does It Work. Link Available Https//Astromachineworks Com/What-Is-Reverse-Engineering 2019.
[7]     Rozesara M, Ghazinoori S, Manteghi M, Tabatabaeian SH. A reverse engineering-based model for innovation process in complex product systems: Multiple case studies in the aviation industry. J Eng Technol Manag 2023;69:101765. https://doi.org/10.1016/j.jengtecman.2023.101765.
[8]     Eilam E. Reversing: Secrets of Reverse Engineering. Indianapolis, Indiana: Wiley Publishing, Inc.; 2005.

  • Receive Date 29 April 2024
  • Revise Date 16 May 2024
  • Accept Date 24 September 2024