尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Software Reverse Engineering
Presented by: Parminder Singh
Roll no: 1607116
Contents
 What is Software Reverse Engineering?
 Why do we need it?
 Where it is used?
 RE tools
 Scope and Tasks
 Limitations
 Conclusion
Reverse Engineering
Reverse engineering also called back engineering,
is the processes of extracting knowledge or design
information from anything man-made and re-
producing it based on the extracted information.
Software Reverse Engineering
It is the process of analyzing a software system to
extract design and implementation information
and create representations of the system in another
form or at a higher level of abstraction.
Engineering a
Software
Reverse
Engineering
Concept Software
Software Concept
Requirements
Analysis
Design
Implementation
Forward
Engineering
Reverse
Engineering
Software Engineering
Why we need it?
 Recovery of lost information
 Providing proper system documentation
 Assisting with maintenance
 Facility of software reuse
 Synthesize higher abstraction
 Discovering unexpected flaws and faults
Where it is used?
 In software design, reverse engineering enables
the developer or programmer to add new
features to the existing software with or without
knowing the source code.
 Reverse engineering is also very beneficial in
software testing, it helps the testers to study the
virus and other malware code.
 The third category where reverse engineering is
widely used is in software security.(Malicious
Software, Cryptographic algorithms)
Reverse Engineering Tools
 System Monitoring Tools
• Network activity, file access and register
access
 Disassemblers
• Translate binary code to assembly code
 Debuggers
• It used in disassembling mode to set break
points and step through program execution
Continue…
 Decompilers
• Attempt to produce high level code (e.g, c)
from an executable binary code.
 Hex Editors
• Read executing program from RAM
• Enable the editing of running hexadecimal
code
The Reversing Process
 System Level Process
• Techniques that help to determine the internal
structure.
• Most of the information comes from O/S ,hence
O/S monitoring utilities.
 Code Level Process
• Techniques provides detailed information from
selected code segment
• Involves extracting design concepts and
algorithms from the binary code
Scope and Task of SRE
 Redocumentation and/or documentation
generation
 Recovery of design approach and design details
at any level of abstraction.
 Identify reusable components
 Understanding high level system design
Limitations
 Illegal and frowned upon
 Limited understanding of design, research time
and cost
 Bugs may be introduced during the process
 Lack of information may cause failure
Conclusion
• Software Reverse Engineering is a new research
area among software maintenance
• It includes activities of understanding the system
and recovery info from system
• Program understanding is the most important
subset of Reverse Engineering
• Discovery of abstraction is key issue
References
 Reverse Engineering and Design Recovery: A
Taxonomy by Elliot J. Chikofsky and James H.
Cross II
 The Problem of Reverse Engineering by Robert W.
Gomulkiewicz and Mary L. Williamson
 Answers, Limitation of Reverse Engineering
 Wikipedia, Reverse Engineering
 Informit, Reverse Engineering Principles
Thank you.. and any..

More Related Content

What's hot

Software myths | Software Engineering Notes
Software myths | Software Engineering NotesSoftware myths | Software Engineering Notes
Software myths | Software Engineering Notes
Navjyotsinh Jadeja
 
formal verification
formal verificationformal verification
formal verification
Toseef Aslam
 
Advanced topics in software engineering
Advanced topics in software engineeringAdvanced topics in software engineering
Advanced topics in software engineering
Rupesh Vaishnav
 
Software re engineering
Software re engineeringSoftware re engineering
Software re engineering
deshpandeamrut
 
Software metrics
Software metricsSoftware metrics
Software metrics
syeda madeha azmat
 
V model presentation
V model presentationV model presentation
V model presentation
Niat Murad
 
Data Designs (Software Engg.)
Data Designs (Software Engg.)Data Designs (Software Engg.)
Data Designs (Software Engg.)
Arun Shukla
 
software project management Artifact set(spm)
software project management Artifact set(spm)software project management Artifact set(spm)
software project management Artifact set(spm)
REHMAT ULLAH
 
Software Engineering (Project Planning & Estimation)
Software Engineering (Project Planning &  Estimation)Software Engineering (Project Planning &  Estimation)
Software Engineering (Project Planning & Estimation)
ShudipPal
 
Unified process Model
Unified process ModelUnified process Model
Unified process Model
University of Haripur
 
Chapter 2 software process models
Chapter 2   software process modelsChapter 2   software process models
Chapter 2 software process models
Golda Margret Sheeba J
 
Code generation
Code generationCode generation
Code generation
Aparna Nayak
 
Software requirements
Software requirementsSoftware requirements
Software requirements
Dr. Loganathan R
 
Software design
Software designSoftware design
Software design
Benazir Fathima
 
Model Based Software Architectures
Model Based Software ArchitecturesModel Based Software Architectures
Model Based Software Architectures
Munazza-Mah-Jabeen
 
Pressman ch-22-process-and-project-metrics
Pressman ch-22-process-and-project-metricsPressman ch-22-process-and-project-metrics
Pressman ch-22-process-and-project-metrics
Seema Kamble
 
Software Engineering by Pankaj Jalote
Software Engineering by Pankaj JaloteSoftware Engineering by Pankaj Jalote
Software Engineering by Pankaj Jalote
Golda Margret Sheeba J
 
Lecture 12 requirements modeling - (system analysis)
Lecture 12   requirements modeling - (system analysis)Lecture 12   requirements modeling - (system analysis)
Lecture 12 requirements modeling - (system analysis)
IIUI
 
Introduction to Compiler design
Introduction to Compiler design Introduction to Compiler design
Introduction to Compiler design
Dr. C.V. Suresh Babu
 
Software Inspection And Defect Management
Software Inspection And Defect ManagementSoftware Inspection And Defect Management
Software Inspection And Defect Management
Ajay K
 

What's hot (20)

Software myths | Software Engineering Notes
Software myths | Software Engineering NotesSoftware myths | Software Engineering Notes
Software myths | Software Engineering Notes
 
formal verification
formal verificationformal verification
formal verification
 
Advanced topics in software engineering
Advanced topics in software engineeringAdvanced topics in software engineering
Advanced topics in software engineering
 
Software re engineering
Software re engineeringSoftware re engineering
Software re engineering
 
Software metrics
Software metricsSoftware metrics
Software metrics
 
V model presentation
V model presentationV model presentation
V model presentation
 
Data Designs (Software Engg.)
Data Designs (Software Engg.)Data Designs (Software Engg.)
Data Designs (Software Engg.)
 
software project management Artifact set(spm)
software project management Artifact set(spm)software project management Artifact set(spm)
software project management Artifact set(spm)
 
Software Engineering (Project Planning & Estimation)
Software Engineering (Project Planning &  Estimation)Software Engineering (Project Planning &  Estimation)
Software Engineering (Project Planning & Estimation)
 
Unified process Model
Unified process ModelUnified process Model
Unified process Model
 
Chapter 2 software process models
Chapter 2   software process modelsChapter 2   software process models
Chapter 2 software process models
 
Code generation
Code generationCode generation
Code generation
 
Software requirements
Software requirementsSoftware requirements
Software requirements
 
Software design
Software designSoftware design
Software design
 
Model Based Software Architectures
Model Based Software ArchitecturesModel Based Software Architectures
Model Based Software Architectures
 
Pressman ch-22-process-and-project-metrics
Pressman ch-22-process-and-project-metricsPressman ch-22-process-and-project-metrics
Pressman ch-22-process-and-project-metrics
 
Software Engineering by Pankaj Jalote
Software Engineering by Pankaj JaloteSoftware Engineering by Pankaj Jalote
Software Engineering by Pankaj Jalote
 
Lecture 12 requirements modeling - (system analysis)
Lecture 12   requirements modeling - (system analysis)Lecture 12   requirements modeling - (system analysis)
Lecture 12 requirements modeling - (system analysis)
 
Introduction to Compiler design
Introduction to Compiler design Introduction to Compiler design
Introduction to Compiler design
 
Software Inspection And Defect Management
Software Inspection And Defect ManagementSoftware Inspection And Defect Management
Software Inspection And Defect Management
 

Viewers also liked

Measuring capacity lesson3
Measuring capacity lesson3Measuring capacity lesson3
Measuring capacity lesson3
Lidia Marie
 
Line balancing
Line balancing Line balancing
Line balancing
Md. Mazadul Hasan Shishir
 
Measurement System Analysis
Measurement System AnalysisMeasurement System Analysis
Measurement System Analysis
Ronald Shewchuk
 
Unit 1 Service Operations Management
Unit 1 Service Operations ManagementUnit 1 Service Operations Management
Unit 1 Service Operations Management
Gopinath Guru
 
Reverse engineering
Reverse engineeringReverse engineering
Reverse engineering
Daniel Stenberg
 
Maintenance, Re-engineering &Reverse Engineering in Software Engineering
Maintenance,Re-engineering &Reverse Engineering in Software EngineeringMaintenance,Re-engineering &Reverse Engineering in Software Engineering
Maintenance, Re-engineering &Reverse Engineering in Software Engineering
Manish Kumar
 
Tools for capacity planning, measurement of capacity, capacity planning process
Tools for capacity planning, measurement of capacity, capacity planning processTools for capacity planning, measurement of capacity, capacity planning process
Tools for capacity planning, measurement of capacity, capacity planning process
Rohan Monis
 
Reverse Engineering of Software Architecture
Reverse Engineering of Software ArchitectureReverse Engineering of Software Architecture
Reverse Engineering of Software Architecture
Dharmalingam Ganesan
 
Legacy Software Maintenance And Management
Legacy Software Maintenance And ManagementLegacy Software Maintenance And Management
Legacy Software Maintenance And Management
ValueCoders
 
Reverse engineering
Reverse engineeringReverse engineering
Reverse engineering
Saswat Padhi
 
Reverse Engineering
Reverse EngineeringReverse Engineering
Reverse Engineering
siddu019
 
Reverse engineering
Reverse engineeringReverse engineering
Reverse engineering
Hicube Infosec
 
Capacity 1
Capacity 1Capacity 1
Capacity 1
Marisa Bajada
 
reverse engineering
reverse engineeringreverse engineering
reverse engineering
ayush_nitt
 
Service Operation - Manajemen Layanan Teknologi Informasi
Service Operation - Manajemen Layanan Teknologi InformasiService Operation - Manajemen Layanan Teknologi Informasi
Service Operation - Manajemen Layanan Teknologi Informasi
Muhammad Idil Haq Amir
 
intra and inter personal relations
intra and inter personal relationsintra and inter personal relations
intra and inter personal relations
Ganesh Sahu
 
Service Operation Processes
Service Operation ProcessesService Operation Processes
Service Operation Processes
nuwulang
 
Capacity Management
Capacity ManagementCapacity Management
Capacity Management
Antonio Gonzalez
 
Facility layout
Facility layoutFacility layout
Facility layout
Faiz Hamzah
 
Capacity Planning with Free Tools
Capacity Planning with Free ToolsCapacity Planning with Free Tools
Capacity Planning with Free Tools
Adrian Cockcroft
 

Viewers also liked (20)

Measuring capacity lesson3
Measuring capacity lesson3Measuring capacity lesson3
Measuring capacity lesson3
 
Line balancing
Line balancing Line balancing
Line balancing
 
Measurement System Analysis
Measurement System AnalysisMeasurement System Analysis
Measurement System Analysis
 
Unit 1 Service Operations Management
Unit 1 Service Operations ManagementUnit 1 Service Operations Management
Unit 1 Service Operations Management
 
Reverse engineering
Reverse engineeringReverse engineering
Reverse engineering
 
Maintenance, Re-engineering &Reverse Engineering in Software Engineering
Maintenance,Re-engineering &Reverse Engineering in Software EngineeringMaintenance,Re-engineering &Reverse Engineering in Software Engineering
Maintenance, Re-engineering &Reverse Engineering in Software Engineering
 
Tools for capacity planning, measurement of capacity, capacity planning process
Tools for capacity planning, measurement of capacity, capacity planning processTools for capacity planning, measurement of capacity, capacity planning process
Tools for capacity planning, measurement of capacity, capacity planning process
 
Reverse Engineering of Software Architecture
Reverse Engineering of Software ArchitectureReverse Engineering of Software Architecture
Reverse Engineering of Software Architecture
 
Legacy Software Maintenance And Management
Legacy Software Maintenance And ManagementLegacy Software Maintenance And Management
Legacy Software Maintenance And Management
 
Reverse engineering
Reverse engineeringReverse engineering
Reverse engineering
 
Reverse Engineering
Reverse EngineeringReverse Engineering
Reverse Engineering
 
Reverse engineering
Reverse engineeringReverse engineering
Reverse engineering
 
Capacity 1
Capacity 1Capacity 1
Capacity 1
 
reverse engineering
reverse engineeringreverse engineering
reverse engineering
 
Service Operation - Manajemen Layanan Teknologi Informasi
Service Operation - Manajemen Layanan Teknologi InformasiService Operation - Manajemen Layanan Teknologi Informasi
Service Operation - Manajemen Layanan Teknologi Informasi
 
intra and inter personal relations
intra and inter personal relationsintra and inter personal relations
intra and inter personal relations
 
Service Operation Processes
Service Operation ProcessesService Operation Processes
Service Operation Processes
 
Capacity Management
Capacity ManagementCapacity Management
Capacity Management
 
Facility layout
Facility layoutFacility layout
Facility layout
 
Capacity Planning with Free Tools
Capacity Planning with Free ToolsCapacity Planning with Free Tools
Capacity Planning with Free Tools
 

Similar to Software reverse engineering

5 chap - MAINTENANCE
5 chap - MAINTENANCE5 chap - MAINTENANCE
5 chap - MAINTENANCE
sujitkumar Sujit.Karande
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
A035401010
A035401010A035401010
A035401010
inventionjournals
 
want to contact me login to www.stqa.org
want to contact me login to www.stqa.orgwant to contact me login to www.stqa.org
want to contact me login to www.stqa.org
nazeer pasha
 
Lecture9
Lecture9Lecture9
Paper_19-Software_Architecture_Reconstruction_Method_a_Survey
Paper_19-Software_Architecture_Reconstruction_Method_a_SurveyPaper_19-Software_Architecture_Reconstruction_Method_a_Survey
Paper_19-Software_Architecture_Reconstruction_Method_a_Survey
Zainab Nayyar
 
Software engineering : Layered Architecture
Software engineering : Layered ArchitectureSoftware engineering : Layered Architecture
Software engineering : Layered Architecture
Muhammed Afsal Villan
 
Programming Fundamentals lecture 3
Programming Fundamentals lecture 3Programming Fundamentals lecture 3
Programming Fundamentals lecture 3
REHAN IJAZ
 
3Audit Software & Tools.pptx
3Audit Software & Tools.pptx3Audit Software & Tools.pptx
3Audit Software & Tools.pptx
jack952975
 
SE chp1 update and learning management .pptx
SE chp1 update and learning management .pptxSE chp1 update and learning management .pptx
SE chp1 update and learning management .pptx
ssuserdee5bb1
 
Computers in management
Computers in managementComputers in management
Computers in management
Kinshook Chaturvedi
 
e-Business - SE trends
e-Business - SE trendse-Business - SE trends
e-Business - SE trends
Vladimir Kotov
 
Object oriented analysis and design unit- v
Object oriented analysis and design unit- vObject oriented analysis and design unit- v
Object oriented analysis and design unit- v
Shri Shankaracharya College, Bhilai,Junwani
 
Sdlc
SdlcSdlc
G213538
G213538G213538
Looking Forwards to Going Backwards
Looking Forwards to Going BackwardsLooking Forwards to Going Backwards
Looking Forwards to Going Backwards
Jonathan Francis Roscoe
 
Reverse EngineeringReverse engineering is also a back engineering .pdf
Reverse EngineeringReverse engineering is also a back engineering .pdfReverse EngineeringReverse engineering is also a back engineering .pdf
Reverse EngineeringReverse engineering is also a back engineering .pdf
anokhijew
 
Sofware Engineering Important Past Paper 2019
Sofware Engineering Important Past Paper 2019Sofware Engineering Important Past Paper 2019
Sofware Engineering Important Past Paper 2019
MuhammadTalha436
 
Software cracking and patching
Software cracking and patchingSoftware cracking and patching
Software cracking and patching
Mayank Gavri
 
Reverse Engineering
Reverse EngineeringReverse Engineering
Reverse Engineering
Taniya Anand
 

Similar to Software reverse engineering (20)

5 chap - MAINTENANCE
5 chap - MAINTENANCE5 chap - MAINTENANCE
5 chap - MAINTENANCE
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A035401010
A035401010A035401010
A035401010
 
want to contact me login to www.stqa.org
want to contact me login to www.stqa.orgwant to contact me login to www.stqa.org
want to contact me login to www.stqa.org
 
Lecture9
Lecture9Lecture9
Lecture9
 
Paper_19-Software_Architecture_Reconstruction_Method_a_Survey
Paper_19-Software_Architecture_Reconstruction_Method_a_SurveyPaper_19-Software_Architecture_Reconstruction_Method_a_Survey
Paper_19-Software_Architecture_Reconstruction_Method_a_Survey
 
Software engineering : Layered Architecture
Software engineering : Layered ArchitectureSoftware engineering : Layered Architecture
Software engineering : Layered Architecture
 
Programming Fundamentals lecture 3
Programming Fundamentals lecture 3Programming Fundamentals lecture 3
Programming Fundamentals lecture 3
 
3Audit Software & Tools.pptx
3Audit Software & Tools.pptx3Audit Software & Tools.pptx
3Audit Software & Tools.pptx
 
SE chp1 update and learning management .pptx
SE chp1 update and learning management .pptxSE chp1 update and learning management .pptx
SE chp1 update and learning management .pptx
 
Computers in management
Computers in managementComputers in management
Computers in management
 
e-Business - SE trends
e-Business - SE trendse-Business - SE trends
e-Business - SE trends
 
Object oriented analysis and design unit- v
Object oriented analysis and design unit- vObject oriented analysis and design unit- v
Object oriented analysis and design unit- v
 
Sdlc
SdlcSdlc
Sdlc
 
G213538
G213538G213538
G213538
 
Looking Forwards to Going Backwards
Looking Forwards to Going BackwardsLooking Forwards to Going Backwards
Looking Forwards to Going Backwards
 
Reverse EngineeringReverse engineering is also a back engineering .pdf
Reverse EngineeringReverse engineering is also a back engineering .pdfReverse EngineeringReverse engineering is also a back engineering .pdf
Reverse EngineeringReverse engineering is also a back engineering .pdf
 
Sofware Engineering Important Past Paper 2019
Sofware Engineering Important Past Paper 2019Sofware Engineering Important Past Paper 2019
Sofware Engineering Important Past Paper 2019
 
Software cracking and patching
Software cracking and patchingSoftware cracking and patching
Software cracking and patching
 
Reverse Engineering
Reverse EngineeringReverse Engineering
Reverse Engineering
 

Recently uploaded

GBSN - Microbiology (Unit 2) Antimicrobial agents
GBSN - Microbiology (Unit 2) Antimicrobial agentsGBSN - Microbiology (Unit 2) Antimicrobial agents
GBSN - Microbiology (Unit 2) Antimicrobial agents
Areesha Ahmad
 
Analysis of Polygenic Traits (GPB-602)
Analysis of Polygenic Traits (GPB-602)Analysis of Polygenic Traits (GPB-602)
Analysis of Polygenic Traits (GPB-602)
PABOLU TEJASREE
 
Cultivation of human viruses and its different techniques.
Cultivation of human viruses and its different techniques.Cultivation of human viruses and its different techniques.
Cultivation of human viruses and its different techniques.
MDAsifKilledar
 
Call Girls Noida🔥9873777170🔥Gorgeous Escorts in Noida Available 24/7
Call Girls Noida🔥9873777170🔥Gorgeous Escorts in Noida Available 24/7Call Girls Noida🔥9873777170🔥Gorgeous Escorts in Noida Available 24/7
Call Girls Noida🔥9873777170🔥Gorgeous Escorts in Noida Available 24/7
yashika sharman06
 
(Shilpa) ➤ Call Girls Lucknow 🔥 9352988975 🔥 Real Fun With Sexual Girl Availa...
(Shilpa) ➤ Call Girls Lucknow 🔥 9352988975 🔥 Real Fun With Sexual Girl Availa...(Shilpa) ➤ Call Girls Lucknow 🔥 9352988975 🔥 Real Fun With Sexual Girl Availa...
(Shilpa) ➤ Call Girls Lucknow 🔥 9352988975 🔥 Real Fun With Sexual Girl Availa...
shourabjaat424
 
Rodents, Birds and locust_Pests of crops.pdf
Rodents, Birds and locust_Pests of crops.pdfRodents, Birds and locust_Pests of crops.pdf
Rodents, Birds and locust_Pests of crops.pdf
PirithiRaju
 
Firoozeh Kashani-Sabet - An Esteemed Professor
Firoozeh Kashani-Sabet - An Esteemed ProfessorFiroozeh Kashani-Sabet - An Esteemed Professor
Firoozeh Kashani-Sabet - An Esteemed Professor
Firoozeh Kashani-Sabet
 
Detecting visual-media-borne disinformation: a summary of latest advances at ...
Detecting visual-media-borne disinformation: a summary of latest advances at ...Detecting visual-media-borne disinformation: a summary of latest advances at ...
Detecting visual-media-borne disinformation: a summary of latest advances at ...
VasileiosMezaris
 
BANANA BUNCHY TOP K R.pptx
BANANA BUNCHY  TOP               K R.pptxBANANA BUNCHY  TOP               K R.pptx
BANANA BUNCHY TOP K R.pptx
KARTHIK REDDY C A
 
ball mill bearing slide shoe bearing trunion bearing metal
ball mill bearing slide shoe bearing  trunion bearing metalball mill bearing slide shoe bearing  trunion bearing metal
ball mill bearing slide shoe bearing trunion bearing metal
srinivasaraonerella1
 
acanthocytes_causes_etiology_clinical sognificance-future.pptx
acanthocytes_causes_etiology_clinical sognificance-future.pptxacanthocytes_causes_etiology_clinical sognificance-future.pptx
acanthocytes_causes_etiology_clinical sognificance-future.pptx
muralinath2
 
SAP Unveils Generative AI Innovations at Annual Sapphire Conference
SAP Unveils Generative AI Innovations at Annual Sapphire ConferenceSAP Unveils Generative AI Innovations at Annual Sapphire Conference
SAP Unveils Generative AI Innovations at Annual Sapphire Conference
CGB SOLUTIONS
 
Buy Best T-shirts for Men Online Buy Best T-shirts for Men Online
Buy Best T-shirts for Men Online Buy Best T-shirts for Men OnlineBuy Best T-shirts for Men Online Buy Best T-shirts for Men Online
Buy Best T-shirts for Men Online Buy Best T-shirts for Men Online
janvi$L14
 
20240515_CEBaP Poster_SR eating_drinking.pdf
20240515_CEBaP Poster_SR eating_drinking.pdf20240515_CEBaP Poster_SR eating_drinking.pdf
20240515_CEBaP Poster_SR eating_drinking.pdf
Hans Van Remoortel
 
Centrifugation types and its application
Centrifugation types and its applicationCentrifugation types and its application
Centrifugation types and its application
MDAsifKilledar
 
WHO 6TH EDITION UPDATE FOR SEMEN ANALYSIS
WHO 6TH EDITION UPDATE FOR SEMEN ANALYSISWHO 6TH EDITION UPDATE FOR SEMEN ANALYSIS
WHO 6TH EDITION UPDATE FOR SEMEN ANALYSIS
SRI AUROBINDO UNIVERSITY
 
Explainable Deepfake Image/Video Detection
Explainable Deepfake Image/Video DetectionExplainable Deepfake Image/Video Detection
Explainable Deepfake Image/Video Detection
VasileiosMezaris
 
22PH503 - Astronomy and Astrophysics - Unit 2 - Spectral Classification of Stars
22PH503 - Astronomy and Astrophysics - Unit 2 - Spectral Classification of Stars22PH503 - Astronomy and Astrophysics - Unit 2 - Spectral Classification of Stars
22PH503 - Astronomy and Astrophysics - Unit 2 - Spectral Classification of Stars
RDhivya6
 
Top Call Girls Lucknow 🔥 9079923931 🔥 Real Fun With Sexual Girl Available 24/...
Top Call Girls Lucknow 🔥 9079923931 🔥 Real Fun With Sexual Girl Available 24/...Top Call Girls Lucknow 🔥 9079923931 🔥 Real Fun With Sexual Girl Available 24/...
Top Call Girls Lucknow 🔥 9079923931 🔥 Real Fun With Sexual Girl Available 24/...
$A19
 
Noida Call Girls Number 9999965857 Vip Call Girls Lady Of Your Dream Ready To...
Noida Call Girls Number 9999965857 Vip Call Girls Lady Of Your Dream Ready To...Noida Call Girls Number 9999965857 Vip Call Girls Lady Of Your Dream Ready To...
Noida Call Girls Number 9999965857 Vip Call Girls Lady Of Your Dream Ready To...
choudharydenunisha
 

Recently uploaded (20)

GBSN - Microbiology (Unit 2) Antimicrobial agents
GBSN - Microbiology (Unit 2) Antimicrobial agentsGBSN - Microbiology (Unit 2) Antimicrobial agents
GBSN - Microbiology (Unit 2) Antimicrobial agents
 
Analysis of Polygenic Traits (GPB-602)
Analysis of Polygenic Traits (GPB-602)Analysis of Polygenic Traits (GPB-602)
Analysis of Polygenic Traits (GPB-602)
 
Cultivation of human viruses and its different techniques.
Cultivation of human viruses and its different techniques.Cultivation of human viruses and its different techniques.
Cultivation of human viruses and its different techniques.
 
Call Girls Noida🔥9873777170🔥Gorgeous Escorts in Noida Available 24/7
Call Girls Noida🔥9873777170🔥Gorgeous Escorts in Noida Available 24/7Call Girls Noida🔥9873777170🔥Gorgeous Escorts in Noida Available 24/7
Call Girls Noida🔥9873777170🔥Gorgeous Escorts in Noida Available 24/7
 
(Shilpa) ➤ Call Girls Lucknow 🔥 9352988975 🔥 Real Fun With Sexual Girl Availa...
(Shilpa) ➤ Call Girls Lucknow 🔥 9352988975 🔥 Real Fun With Sexual Girl Availa...(Shilpa) ➤ Call Girls Lucknow 🔥 9352988975 🔥 Real Fun With Sexual Girl Availa...
(Shilpa) ➤ Call Girls Lucknow 🔥 9352988975 🔥 Real Fun With Sexual Girl Availa...
 
Rodents, Birds and locust_Pests of crops.pdf
Rodents, Birds and locust_Pests of crops.pdfRodents, Birds and locust_Pests of crops.pdf
Rodents, Birds and locust_Pests of crops.pdf
 
Firoozeh Kashani-Sabet - An Esteemed Professor
Firoozeh Kashani-Sabet - An Esteemed ProfessorFiroozeh Kashani-Sabet - An Esteemed Professor
Firoozeh Kashani-Sabet - An Esteemed Professor
 
Detecting visual-media-borne disinformation: a summary of latest advances at ...
Detecting visual-media-borne disinformation: a summary of latest advances at ...Detecting visual-media-borne disinformation: a summary of latest advances at ...
Detecting visual-media-borne disinformation: a summary of latest advances at ...
 
BANANA BUNCHY TOP K R.pptx
BANANA BUNCHY  TOP               K R.pptxBANANA BUNCHY  TOP               K R.pptx
BANANA BUNCHY TOP K R.pptx
 
ball mill bearing slide shoe bearing trunion bearing metal
ball mill bearing slide shoe bearing  trunion bearing metalball mill bearing slide shoe bearing  trunion bearing metal
ball mill bearing slide shoe bearing trunion bearing metal
 
acanthocytes_causes_etiology_clinical sognificance-future.pptx
acanthocytes_causes_etiology_clinical sognificance-future.pptxacanthocytes_causes_etiology_clinical sognificance-future.pptx
acanthocytes_causes_etiology_clinical sognificance-future.pptx
 
SAP Unveils Generative AI Innovations at Annual Sapphire Conference
SAP Unveils Generative AI Innovations at Annual Sapphire ConferenceSAP Unveils Generative AI Innovations at Annual Sapphire Conference
SAP Unveils Generative AI Innovations at Annual Sapphire Conference
 
Buy Best T-shirts for Men Online Buy Best T-shirts for Men Online
Buy Best T-shirts for Men Online Buy Best T-shirts for Men OnlineBuy Best T-shirts for Men Online Buy Best T-shirts for Men Online
Buy Best T-shirts for Men Online Buy Best T-shirts for Men Online
 
20240515_CEBaP Poster_SR eating_drinking.pdf
20240515_CEBaP Poster_SR eating_drinking.pdf20240515_CEBaP Poster_SR eating_drinking.pdf
20240515_CEBaP Poster_SR eating_drinking.pdf
 
Centrifugation types and its application
Centrifugation types and its applicationCentrifugation types and its application
Centrifugation types and its application
 
WHO 6TH EDITION UPDATE FOR SEMEN ANALYSIS
WHO 6TH EDITION UPDATE FOR SEMEN ANALYSISWHO 6TH EDITION UPDATE FOR SEMEN ANALYSIS
WHO 6TH EDITION UPDATE FOR SEMEN ANALYSIS
 
Explainable Deepfake Image/Video Detection
Explainable Deepfake Image/Video DetectionExplainable Deepfake Image/Video Detection
Explainable Deepfake Image/Video Detection
 
22PH503 - Astronomy and Astrophysics - Unit 2 - Spectral Classification of Stars
22PH503 - Astronomy and Astrophysics - Unit 2 - Spectral Classification of Stars22PH503 - Astronomy and Astrophysics - Unit 2 - Spectral Classification of Stars
22PH503 - Astronomy and Astrophysics - Unit 2 - Spectral Classification of Stars
 
Top Call Girls Lucknow 🔥 9079923931 🔥 Real Fun With Sexual Girl Available 24/...
Top Call Girls Lucknow 🔥 9079923931 🔥 Real Fun With Sexual Girl Available 24/...Top Call Girls Lucknow 🔥 9079923931 🔥 Real Fun With Sexual Girl Available 24/...
Top Call Girls Lucknow 🔥 9079923931 🔥 Real Fun With Sexual Girl Available 24/...
 
Noida Call Girls Number 9999965857 Vip Call Girls Lady Of Your Dream Ready To...
Noida Call Girls Number 9999965857 Vip Call Girls Lady Of Your Dream Ready To...Noida Call Girls Number 9999965857 Vip Call Girls Lady Of Your Dream Ready To...
Noida Call Girls Number 9999965857 Vip Call Girls Lady Of Your Dream Ready To...
 

Software reverse engineering

  • 1. Software Reverse Engineering Presented by: Parminder Singh Roll no: 1607116
  • 2. Contents  What is Software Reverse Engineering?  Why do we need it?  Where it is used?  RE tools  Scope and Tasks  Limitations  Conclusion
  • 3. Reverse Engineering Reverse engineering also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re- producing it based on the extracted information.
  • 4. Software Reverse Engineering It is the process of analyzing a software system to extract design and implementation information and create representations of the system in another form or at a higher level of abstraction. Engineering a Software Reverse Engineering Concept Software Software Concept
  • 6. Why we need it?  Recovery of lost information  Providing proper system documentation  Assisting with maintenance  Facility of software reuse  Synthesize higher abstraction  Discovering unexpected flaws and faults
  • 7. Where it is used?  In software design, reverse engineering enables the developer or programmer to add new features to the existing software with or without knowing the source code.  Reverse engineering is also very beneficial in software testing, it helps the testers to study the virus and other malware code.  The third category where reverse engineering is widely used is in software security.(Malicious Software, Cryptographic algorithms)
  • 8. Reverse Engineering Tools  System Monitoring Tools • Network activity, file access and register access  Disassemblers • Translate binary code to assembly code  Debuggers • It used in disassembling mode to set break points and step through program execution
  • 9. Continue…  Decompilers • Attempt to produce high level code (e.g, c) from an executable binary code.  Hex Editors • Read executing program from RAM • Enable the editing of running hexadecimal code
  • 10. The Reversing Process  System Level Process • Techniques that help to determine the internal structure. • Most of the information comes from O/S ,hence O/S monitoring utilities.  Code Level Process • Techniques provides detailed information from selected code segment • Involves extracting design concepts and algorithms from the binary code
  • 11. Scope and Task of SRE  Redocumentation and/or documentation generation  Recovery of design approach and design details at any level of abstraction.  Identify reusable components  Understanding high level system design
  • 12. Limitations  Illegal and frowned upon  Limited understanding of design, research time and cost  Bugs may be introduced during the process  Lack of information may cause failure
  • 13. Conclusion • Software Reverse Engineering is a new research area among software maintenance • It includes activities of understanding the system and recovery info from system • Program understanding is the most important subset of Reverse Engineering • Discovery of abstraction is key issue
  • 14. References  Reverse Engineering and Design Recovery: A Taxonomy by Elliot J. Chikofsky and James H. Cross II  The Problem of Reverse Engineering by Robert W. Gomulkiewicz and Mary L. Williamson  Answers, Limitation of Reverse Engineering  Wikipedia, Reverse Engineering  Informit, Reverse Engineering Principles
  翻译: