SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 9, Issue 9 (January 2014), PP. 04-06

Understanding Contemporary advances in Reverse
Engineering Tools
Kadam P.A.1, Dr. S.D.Khamitkar2, Dr.S.B.Thorat3
1

Assit. Professor, Department of Computer Science, Institute of Technology & Management College, Nanded
2
Associate Professor, School of Computational Sciences, SRTM University, Nanded.
3
Director, Institute of Technology & Management College, Nanded.

Abstract:- Reverse engineering is the process of analyzing software. Reverse engineering is essential for
providing security to applications and it has been an active research topic today. Presently there are number of
R.E.(Reverse Engineering) tools available in the market. We have observed that every tool has its own speciality
and drawbacks. In this paper we have rigorously studied some of the tools.
Keywords:- Reverse Engineering, Software Engineering, Decompilation, Software Testing.

I.

INTRODUCTION

Today, in software industries number of operating platforms and languages are available and they are
continuously increasing so using R.E. tool it is easy to maintain them. The aim of reverse engineering (RE) is to
get different types of information from existing software and use this information for rebuilt the software and
maintain that software and better understand about that software. Different freeware R. E. tools are available in
the software market, but each and every tool having their limitation. They are designed for reverse engineering
software for a specific language. No such fully automatic tool is currently available in the software market
which can reverse the software 100%.The concept of Reverse Engineering is used in many fields of IT every
day. Reverse engineering is not actively taught as a part of computer science courses. Reverse Engineering has
been one of the most promising technologies to understand the legacy system and help them in reengineering
it.RE encompasses any activity that is done to determine how a product works, to learn the ideas and technology
that were used in developing that product. Using R.E. tools we are able to maintain Software and their problems.

II.

CURRENT TRENDS IN REVERSE ENGINEERING

Currently, research on reverse engineering on some of the programming languages such as Java and
C/C++, with secondary interest in the .NET area. Some freely available reverse engineering tools are as follows.
1.
2.

In java: cavaj,djdec312,djjava,jcavaj and jdgui etc.
In .net: codereflect,devevtras,dis#,dotpeek, spices evalution, etc.

Almost all software’s are design in the base that is not open-source and they are protected against the
unauthorised users, but as far as per above we can tell all specialised software does reverse engineering in
some degree. This is fundamental unanswered argument. Every person in computer industry will face reverse
engineering issues. Software Reverse Engineering is done to improve the performance of a program [1]. The
concept of Reverse Engineering is used in many fields of IT every day, to name just a few: legacy compatibility,
binary code patching, malware analysis, network protocols analysis, debugging or even rapid prototyping.
Reverse engineering techniques provide the means for recovering lost information and developing alternative
representations of a system, such as generation of structure charts, dataflow diagrams, entity-relationship
diagrams, etc [2]. Various types of software research engineering tools are there, still there is great need of
reverse engineering tools and processes to evolve with the development environment that stresses components,
the Web, and distributed systems [3].
Software reverse engineering use to see how particular software work and with the help of that
information we can able to create new or duplicate product. Software reverse engineering use to reversing a
program's machine code which is in the format of binary language i.e. 0 and 1 translate it back to back into
the source code that it was written in, Software reverse engineering is done to get back the source code of a
program if the source code is lost, to learning how the program performs certain operations, to develop the
performance of a program, to repair a bug , to identify hateful content in a program such as a virus or to adapt
a program written for use with one computer chip for use with another. Reverse engineering for the reason of
copying or duplicating programs may stand for a copyright disobedience. In some cases, the permitted use of

4
Understanding Contemporary advances in Reverse Engineering Tools
software purposely prohibits reverse engineering. There are several commercial reverse engineering tools on
the market providing different capabilities and supporting specific source code languages [4]
Somebody doing reverse engineering on software may use several tools to disassemble a program.
Several techniques have been suggested for supporting reverse engineering and design recovery activities[5]
One of the many available tools is a Hexadecimal Dumper, which prints or displays the binary numbers of a
program in hexadecimal format. By knowing the small parts that characterize the processor information as well
as the instruction lengths, the reverse engineer can classify certain portions of a program to see how they work.
Another common tool is the Disassembler. Hardware reverse engineering means to see how particular hardware
work for example if a mobile development company want to see how competitors mobile works then they can
purchase competitors mobile ,disassemble it and then make a mobile similar to it, however this process is
banned in many countries. In general hardware reverse engineering requires a great deal of skill and is quite
costly. Various reverse engineering and program comprehension tools and methods have been developed to help
the software maintainer or reengineer understand the current structure and behaviour of the subject system.[6]

III.
1.
2.
3.
4.
5.

UNDERSTANDING CONTEMPORARY ADVANCES IN R. E. TOOLS

As a knowledge tool.
As a way to make new well-suited products that are cheaper than what's currently in the market.
For making software inter operate more effectively or to link different operating systems or databases.
To find out the uncoordinated features of money-making products.
Reverse engineering software helps researchers to examine the strength of systems and identify their
weaknesses with different aspects and applications of reverse engineering.
Criminal cyberspace actions are growing rapidly and many software engineers are
using reverse engineering methods to answer the attacks.
The security sensitive environment of these tasks, such as the understanding of malware or the decryption
of encrypted content, brings unique challenges to reverse engineering, work has to be done offline, files
can rarely be shared, time pressure is huge, and there is a require of tool and process support for capturing
and sharing the knowledge obtained while trying to understand basic assembly code.
Most malware code is distributed in encrypted form at runtime; an unpacker routine transforms this to the
original executable form of the code, which is then executed.
Recovery of missing information, providing proper system documentation , secondary with maintenance
,recognition of side effects and anomalies, Migration to another hw/sw platform , Facilitating software
reuse.

6.
7.

8.
9.

As reverse engineering is a fundamental need to understand the software . As they are often badly
designed and have an incomplete, nonexistent, or, even worse, wrong documentation without any design
information, this is a challenging task [7]. This kind of inquiry engages individuals in a constructive learning
process about the operation of systems and products. The process of taking something apart and revealing the
way in which it works is an effective way to learn how to build a technology or make improvements to it. It is
important to identify the goals and limitations of the effort before beginning the reverse engineering activity[8].
Reverse engineering consists of the following steps:
1.
2.
3.

Watch and review the mechanisms that make the device work.
analyze and learning the internal workings of a mechanical device.
evaluate the real device to your observations and suggest progress.

By using reverse engineering, a researcher can collect the practical data necessary for the
documentation of the operation of a technology or element of a system. When reverse engineering software,
researchers are able to observe the strong point of systems and identify their weaknesses in terms of
performance, protection, and interoperability. Reverse engineering is a systematic form of program
understanding that takes a program and constructs a high-level representation useful for documentation,
maintenance, or reuse.[9] The reverse engineering method allows researchers to recognize both how a program
works and also what aspects of the program contribute to its not working. The IEEE Standard for Software
Maintenance (IEEE Std 1219-1993) defines reverse engineering as “the process of extracting software system
information (including documentation) from source code”.

IV.

CONCLUSION

In this paper we overview the concept of reverse engineering which begins with the creation and
works through the propose process in the reverse way to turn up at a product definition statement. The use of

5
Understanding Contemporary advances in Reverse Engineering Tools
existing R.E. Tools and how they are useful in the process of R.E. The conception of better designs and the
interoperability of existing products often begin with reverse engineering. In doing so, it uncovers as much
information as possible about the design ideas that were used to produce a particular product. It usually involves
rising a set of functional provision for a product, system or piece of equipment, based on an analysis of existing
product. There must be need of reverse engineering.

REFERENCES
[1].
[2].

[3].
[4].
[5].
[6].
[7].
[8].
[9].

MamtaGarg & Manoj Kumar Jindal “Reverse Engineering – Roadmap to Effective software Design by
in” International Journal of Recent Trends in Engineering, Vol. 1, No. 2, May 2009. P.No.186-188.
Spencer Rugaber and Richard Clayton , “The representation problem in reverse engineering”, In
Proceedings of the Working Conference in Reverse Engineering, Baltimore, Maryland, pp. 8–16, IEEE
Computer Society, 1993.
K. Bennett and V. Rajlich , “Software maintenance and evolution: A roadmap”, In A. Finkelstein,
ed., The Future of Software Engineering, ACM ISBN: 1-58113-253-0, 2000, pp. 73-90
Berndt Bellay, Harald Gall, “An Evaluation of Reverse Engineering Tool Capabilities” Distributed
Systems Group, Technical University of Vienna, A-1040 Vienna, Austria, Europe
Gerald C. Gannod , Betty H. C. Cheng “A Framework for Classifying and Comparing Software
Reverse Engineering and Design Recovery Techniques”
Paolo Tonella Marco Torchiano Bart Du Bois Tarja Systä “Empirical studies in reverse engineering:
state of the art and future trends ” © Springer Science + Business Media, LLC 2007
Ira D. Baxter Michael Mehlich “Reverse Engineering is Reverse Forward Engineering “ Semantic
Designs, Inc. 12636 Research Blvd. C-214 Austin
Nadim Asif “Software reverse engineering process: Factors, elements and features” International
Journal of Library and Information Science Vol. 2(7), pp. 124-136, October 2010
Asit Kumar Gahalaut, Padmavati Khandnor “ Reverse Engineering: An Essence for Software ReEngineering and Program Analysis” International Journal of Engineering Science and Technology
Vol. 2(06), 2010, 2296-2303

6

Contenu connexe

Tendances

NETCDL : THE NETWORK CERTIFICATION DESCRIPTION LANGUAGE
NETCDL : THE NETWORK CERTIFICATION DESCRIPTION LANGUAGENETCDL : THE NETWORK CERTIFICATION DESCRIPTION LANGUAGE
NETCDL : THE NETWORK CERTIFICATION DESCRIPTION LANGUAGEijcsitcejournal
 
Software engineering principles (marcello thiry)
Software engineering principles (marcello thiry)Software engineering principles (marcello thiry)
Software engineering principles (marcello thiry)Marcello Thiry
 
Introduction to software engineering
Introduction to software engineeringIntroduction to software engineering
Introduction to software engineeringHitesh Mohapatra
 
IRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of CodeIRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of CodeIRJET Journal
 
Introduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyIntroduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyGaditek
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineeringtanni821216
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software EngineeringZahoor Khan
 
Software engineering introduction
Software engineering introductionSoftware engineering introduction
Software engineering introductionVishal Singh
 
software engineering
software engineeringsoftware engineering
software engineeringTayfun Çelik
 
Software Engineering Unit-1
Software Engineering Unit-1Software Engineering Unit-1
Software Engineering Unit-1Samura Daniel
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patentIAEME Publication
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patentiaemedu
 
IRJET- How Artificial Intelligence Accelerates Software Development
IRJET- How Artificial Intelligence Accelerates Software DevelopmentIRJET- How Artificial Intelligence Accelerates Software Development
IRJET- How Artificial Intelligence Accelerates Software DevelopmentIRJET Journal
 
Software engineering principles in system software design
Software engineering principles in system software designSoftware engineering principles in system software design
Software engineering principles in system software designTech_MX
 
SE_Lec 00_ Software Engineering 1
SE_Lec 00_ Software Engineering 1SE_Lec 00_ Software Engineering 1
SE_Lec 00_ Software Engineering 1Amr E. Mohamed
 

Tendances (20)

Software engineering
Software engineeringSoftware engineering
Software engineering
 
NETCDL : THE NETWORK CERTIFICATION DESCRIPTION LANGUAGE
NETCDL : THE NETWORK CERTIFICATION DESCRIPTION LANGUAGENETCDL : THE NETWORK CERTIFICATION DESCRIPTION LANGUAGE
NETCDL : THE NETWORK CERTIFICATION DESCRIPTION LANGUAGE
 
Software engineering principles (marcello thiry)
Software engineering principles (marcello thiry)Software engineering principles (marcello thiry)
Software engineering principles (marcello thiry)
 
Introduction to software engineering
Introduction to software engineeringIntroduction to software engineering
Introduction to software engineering
 
IRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of CodeIRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of Code
 
Introduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyIntroduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information Technology
 
Itc chapter # 7
Itc   chapter # 7Itc   chapter # 7
Itc chapter # 7
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Sepm t1
Sepm t1Sepm t1
Sepm t1
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
Software engineering introduction
Software engineering introductionSoftware engineering introduction
Software engineering introduction
 
software engineering
software engineeringsoftware engineering
software engineering
 
Software Engineering Unit-1
Software Engineering Unit-1Software Engineering Unit-1
Software Engineering Unit-1
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patent
 
Pattern based software patent
Pattern based software patentPattern based software patent
Pattern based software patent
 
IRJET- How Artificial Intelligence Accelerates Software Development
IRJET- How Artificial Intelligence Accelerates Software DevelopmentIRJET- How Artificial Intelligence Accelerates Software Development
IRJET- How Artificial Intelligence Accelerates Software Development
 
Software engineering principles in system software design
Software engineering principles in system software designSoftware engineering principles in system software design
Software engineering principles in system software design
 
SE_Lec 00_ Software Engineering 1
SE_Lec 00_ Software Engineering 1SE_Lec 00_ Software Engineering 1
SE_Lec 00_ Software Engineering 1
 
Sarvesh_kumar
Sarvesh_kumarSarvesh_kumar
Sarvesh_kumar
 
Chapter1
Chapter1Chapter1
Chapter1
 

En vedette

114. mc k part 3 hbo
114. mc k part 3   hbo114. mc k part 3   hbo
114. mc k part 3 hboHispros
 
Aula #107 Prezentacja
Aula #107 PrezentacjaAula #107 Prezentacja
Aula #107 PrezentacjaAdamPawlowski
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
игрушки
игрушкиигрушки
игрушкиklim6868
 
RST2014_Voronezh_EngineeringTools
RST2014_Voronezh_EngineeringToolsRST2014_Voronezh_EngineeringTools
RST2014_Voronezh_EngineeringToolsRussianStartupTour
 
Maite,saray y andrea
Maite,saray y andreaMaite,saray y andrea
Maite,saray y andreaA Solaina
 
Brands that leveraged Gangnam Style on Social Media
Brands that leveraged Gangnam Style on Social Media Brands that leveraged Gangnam Style on Social Media
Brands that leveraged Gangnam Style on Social Media Unmetric
 
Directores t.completo 3 1_14
Directores t.completo 3 1_14Directores t.completo 3 1_14
Directores t.completo 3 1_14Andrea Maneiro
 
конкурс мусора больше нет
конкурс мусора больше нетконкурс мусора больше нет
конкурс мусора больше нетarh2013
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Dayak punan gahary dan ancaman sibsistensi
Dayak punan   gahary dan ancaman sibsistensiDayak punan   gahary dan ancaman sibsistensi
Dayak punan gahary dan ancaman sibsistensiFandy Chalifah
 

En vedette (20)

114. mc k part 3 hbo
114. mc k part 3   hbo114. mc k part 3   hbo
114. mc k part 3 hbo
 
MedWide
MedWideMedWide
MedWide
 
Aula #107 Prezentacja
Aula #107 PrezentacjaAula #107 Prezentacja
Aula #107 Prezentacja
 
Power point english
Power point englishPower point english
Power point english
 
դդում
դդումդդում
դդում
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
игрушки
игрушкиигрушки
игрушки
 
RST2014_Voronezh_EngineeringTools
RST2014_Voronezh_EngineeringToolsRST2014_Voronezh_EngineeringTools
RST2014_Voronezh_EngineeringTools
 
Maite,saray y andrea
Maite,saray y andreaMaite,saray y andrea
Maite,saray y andrea
 
Planeta Zemlja
Planeta ZemljaPlaneta Zemlja
Planeta Zemlja
 
Brands that leveraged Gangnam Style on Social Media
Brands that leveraged Gangnam Style on Social Media Brands that leveraged Gangnam Style on Social Media
Brands that leveraged Gangnam Style on Social Media
 
certifications 2
certifications 2certifications 2
certifications 2
 
Directores t.completo 3 1_14
Directores t.completo 3 1_14Directores t.completo 3 1_14
Directores t.completo 3 1_14
 
конкурс мусора больше нет
конкурс мусора больше нетконкурс мусора больше нет
конкурс мусора больше нет
 
Resistance! Intactivism in Europe
Resistance! Intactivism in EuropeResistance! Intactivism in Europe
Resistance! Intactivism in Europe
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
sample
samplesample
sample
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Dayak punan gahary dan ancaman sibsistensi
Dayak punan   gahary dan ancaman sibsistensiDayak punan   gahary dan ancaman sibsistensi
Dayak punan gahary dan ancaman sibsistensi
 

Similaire à International Journal of Engineering Research and Development (20)

A035401010
A035401010A035401010
A035401010
 
Importance of software engineering
Importance of software engineeringImportance of software engineering
Importance of software engineering
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
SE 1 Software Engineering.pptx
SE 1 Software Engineering.pptxSE 1 Software Engineering.pptx
SE 1 Software Engineering.pptx
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
WhitePaperTemplate
WhitePaperTemplateWhitePaperTemplate
WhitePaperTemplate
 
SE Lecture 1.ppt
SE Lecture 1.pptSE Lecture 1.ppt
SE Lecture 1.ppt
 
SE Lecture 1.ppt
SE Lecture 1.pptSE Lecture 1.ppt
SE Lecture 1.ppt
 
Chapter 1 1 - intro ppt
Chapter 1   1 - intro pptChapter 1   1 - intro ppt
Chapter 1 1 - intro ppt
 
Software Engineering pdf
Software Engineering pdfSoftware Engineering pdf
Software Engineering pdf
 
Intro
IntroIntro
Intro
 
SE notes 2.pdf
SE notes 2.pdfSE notes 2.pdf
SE notes 2.pdf
 
V4I5201571
V4I5201571V4I5201571
V4I5201571
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
The Product and Process(1).pdf
The Product and Process(1).pdfThe Product and Process(1).pdf
The Product and Process(1).pdf
 
SE Introduction sharbani bhattacharya
SE Introduction sharbani bhattacharyaSE Introduction sharbani bhattacharya
SE Introduction sharbani bhattacharya
 
SOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdfSOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdf
 
SE
SESE
SE
 

Plus de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Plus de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Dernier

AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 

Dernier (20)

AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 

International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 9, Issue 9 (January 2014), PP. 04-06 Understanding Contemporary advances in Reverse Engineering Tools Kadam P.A.1, Dr. S.D.Khamitkar2, Dr.S.B.Thorat3 1 Assit. Professor, Department of Computer Science, Institute of Technology & Management College, Nanded 2 Associate Professor, School of Computational Sciences, SRTM University, Nanded. 3 Director, Institute of Technology & Management College, Nanded. Abstract:- Reverse engineering is the process of analyzing software. Reverse engineering is essential for providing security to applications and it has been an active research topic today. Presently there are number of R.E.(Reverse Engineering) tools available in the market. We have observed that every tool has its own speciality and drawbacks. In this paper we have rigorously studied some of the tools. Keywords:- Reverse Engineering, Software Engineering, Decompilation, Software Testing. I. INTRODUCTION Today, in software industries number of operating platforms and languages are available and they are continuously increasing so using R.E. tool it is easy to maintain them. The aim of reverse engineering (RE) is to get different types of information from existing software and use this information for rebuilt the software and maintain that software and better understand about that software. Different freeware R. E. tools are available in the software market, but each and every tool having their limitation. They are designed for reverse engineering software for a specific language. No such fully automatic tool is currently available in the software market which can reverse the software 100%.The concept of Reverse Engineering is used in many fields of IT every day. Reverse engineering is not actively taught as a part of computer science courses. Reverse Engineering has been one of the most promising technologies to understand the legacy system and help them in reengineering it.RE encompasses any activity that is done to determine how a product works, to learn the ideas and technology that were used in developing that product. Using R.E. tools we are able to maintain Software and their problems. II. CURRENT TRENDS IN REVERSE ENGINEERING Currently, research on reverse engineering on some of the programming languages such as Java and C/C++, with secondary interest in the .NET area. Some freely available reverse engineering tools are as follows. 1. 2. In java: cavaj,djdec312,djjava,jcavaj and jdgui etc. In .net: codereflect,devevtras,dis#,dotpeek, spices evalution, etc. Almost all software’s are design in the base that is not open-source and they are protected against the unauthorised users, but as far as per above we can tell all specialised software does reverse engineering in some degree. This is fundamental unanswered argument. Every person in computer industry will face reverse engineering issues. Software Reverse Engineering is done to improve the performance of a program [1]. The concept of Reverse Engineering is used in many fields of IT every day, to name just a few: legacy compatibility, binary code patching, malware analysis, network protocols analysis, debugging or even rapid prototyping. Reverse engineering techniques provide the means for recovering lost information and developing alternative representations of a system, such as generation of structure charts, dataflow diagrams, entity-relationship diagrams, etc [2]. Various types of software research engineering tools are there, still there is great need of reverse engineering tools and processes to evolve with the development environment that stresses components, the Web, and distributed systems [3]. Software reverse engineering use to see how particular software work and with the help of that information we can able to create new or duplicate product. Software reverse engineering use to reversing a program's machine code which is in the format of binary language i.e. 0 and 1 translate it back to back into the source code that it was written in, Software reverse engineering is done to get back the source code of a program if the source code is lost, to learning how the program performs certain operations, to develop the performance of a program, to repair a bug , to identify hateful content in a program such as a virus or to adapt a program written for use with one computer chip for use with another. Reverse engineering for the reason of copying or duplicating programs may stand for a copyright disobedience. In some cases, the permitted use of 4
  • 2. Understanding Contemporary advances in Reverse Engineering Tools software purposely prohibits reverse engineering. There are several commercial reverse engineering tools on the market providing different capabilities and supporting specific source code languages [4] Somebody doing reverse engineering on software may use several tools to disassemble a program. Several techniques have been suggested for supporting reverse engineering and design recovery activities[5] One of the many available tools is a Hexadecimal Dumper, which prints or displays the binary numbers of a program in hexadecimal format. By knowing the small parts that characterize the processor information as well as the instruction lengths, the reverse engineer can classify certain portions of a program to see how they work. Another common tool is the Disassembler. Hardware reverse engineering means to see how particular hardware work for example if a mobile development company want to see how competitors mobile works then they can purchase competitors mobile ,disassemble it and then make a mobile similar to it, however this process is banned in many countries. In general hardware reverse engineering requires a great deal of skill and is quite costly. Various reverse engineering and program comprehension tools and methods have been developed to help the software maintainer or reengineer understand the current structure and behaviour of the subject system.[6] III. 1. 2. 3. 4. 5. UNDERSTANDING CONTEMPORARY ADVANCES IN R. E. TOOLS As a knowledge tool. As a way to make new well-suited products that are cheaper than what's currently in the market. For making software inter operate more effectively or to link different operating systems or databases. To find out the uncoordinated features of money-making products. Reverse engineering software helps researchers to examine the strength of systems and identify their weaknesses with different aspects and applications of reverse engineering. Criminal cyberspace actions are growing rapidly and many software engineers are using reverse engineering methods to answer the attacks. The security sensitive environment of these tasks, such as the understanding of malware or the decryption of encrypted content, brings unique challenges to reverse engineering, work has to be done offline, files can rarely be shared, time pressure is huge, and there is a require of tool and process support for capturing and sharing the knowledge obtained while trying to understand basic assembly code. Most malware code is distributed in encrypted form at runtime; an unpacker routine transforms this to the original executable form of the code, which is then executed. Recovery of missing information, providing proper system documentation , secondary with maintenance ,recognition of side effects and anomalies, Migration to another hw/sw platform , Facilitating software reuse. 6. 7. 8. 9. As reverse engineering is a fundamental need to understand the software . As they are often badly designed and have an incomplete, nonexistent, or, even worse, wrong documentation without any design information, this is a challenging task [7]. This kind of inquiry engages individuals in a constructive learning process about the operation of systems and products. The process of taking something apart and revealing the way in which it works is an effective way to learn how to build a technology or make improvements to it. It is important to identify the goals and limitations of the effort before beginning the reverse engineering activity[8]. Reverse engineering consists of the following steps: 1. 2. 3. Watch and review the mechanisms that make the device work. analyze and learning the internal workings of a mechanical device. evaluate the real device to your observations and suggest progress. By using reverse engineering, a researcher can collect the practical data necessary for the documentation of the operation of a technology or element of a system. When reverse engineering software, researchers are able to observe the strong point of systems and identify their weaknesses in terms of performance, protection, and interoperability. Reverse engineering is a systematic form of program understanding that takes a program and constructs a high-level representation useful for documentation, maintenance, or reuse.[9] The reverse engineering method allows researchers to recognize both how a program works and also what aspects of the program contribute to its not working. The IEEE Standard for Software Maintenance (IEEE Std 1219-1993) defines reverse engineering as “the process of extracting software system information (including documentation) from source code”. IV. CONCLUSION In this paper we overview the concept of reverse engineering which begins with the creation and works through the propose process in the reverse way to turn up at a product definition statement. The use of 5
  • 3. Understanding Contemporary advances in Reverse Engineering Tools existing R.E. Tools and how they are useful in the process of R.E. The conception of better designs and the interoperability of existing products often begin with reverse engineering. In doing so, it uncovers as much information as possible about the design ideas that were used to produce a particular product. It usually involves rising a set of functional provision for a product, system or piece of equipment, based on an analysis of existing product. There must be need of reverse engineering. REFERENCES [1]. [2]. [3]. [4]. [5]. [6]. [7]. [8]. [9]. MamtaGarg & Manoj Kumar Jindal “Reverse Engineering – Roadmap to Effective software Design by in” International Journal of Recent Trends in Engineering, Vol. 1, No. 2, May 2009. P.No.186-188. Spencer Rugaber and Richard Clayton , “The representation problem in reverse engineering”, In Proceedings of the Working Conference in Reverse Engineering, Baltimore, Maryland, pp. 8–16, IEEE Computer Society, 1993. K. Bennett and V. Rajlich , “Software maintenance and evolution: A roadmap”, In A. Finkelstein, ed., The Future of Software Engineering, ACM ISBN: 1-58113-253-0, 2000, pp. 73-90 Berndt Bellay, Harald Gall, “An Evaluation of Reverse Engineering Tool Capabilities” Distributed Systems Group, Technical University of Vienna, A-1040 Vienna, Austria, Europe Gerald C. Gannod , Betty H. C. Cheng “A Framework for Classifying and Comparing Software Reverse Engineering and Design Recovery Techniques” Paolo Tonella Marco Torchiano Bart Du Bois Tarja Systä “Empirical studies in reverse engineering: state of the art and future trends ” © Springer Science + Business Media, LLC 2007 Ira D. Baxter Michael Mehlich “Reverse Engineering is Reverse Forward Engineering “ Semantic Designs, Inc. 12636 Research Blvd. C-214 Austin Nadim Asif “Software reverse engineering process: Factors, elements and features” International Journal of Library and Information Science Vol. 2(7), pp. 124-136, October 2010 Asit Kumar Gahalaut, Padmavati Khandnor “ Reverse Engineering: An Essence for Software ReEngineering and Program Analysis” International Journal of Engineering Science and Technology Vol. 2(06), 2010, 2296-2303 6