SlideShare a Scribd company logo
2
Most read
3
Most read
Reverse Engineering in
Software Engineering
By:- Vaibhav Dubey
B.Tech(CSE) V
Introduction
• Reverse engineering is taking apart an object to see how it works in order to
duplicate or enhance the object. The practice, taken from older industries, is
now frequently used on computer hardware and software. Software reverse
engineering involves reversing a program's machine code (the string of 0s
and 1s that are sent to the logic processor) back into the source code that it
was written in, using program language statements.
Need
• Software reverse engineering is done to retrieve the source code of a
program because the source code was lost, to study how the program
performs certain operations, to improve the performance of a program, to
fix a bug (correct an error in the program when the source code is not
available), to identify malicious content in a program such as a virus or to
adapt a program written for use with one microprocessor for use with
another.
Tools
• Hexadecimal Dumper: Prints or displays the binary numbers of a
program in hexadecimal format (which is easier to read than a binary
format).
• Disassembler: Reads the binary code and then displays each executable
instruction in text form. A disassembler cannot tell the difference between
an executable instruction and the data used by the program.
• Debugger : Allows the disassembler to avoid disassembling the data
portions of a program.
Types
• Hardware reverse engineering involves taking apart a device to see how it
works. For example, if a processor manufacturer wants to see how a
competitor's processor works, they can purchase a competitor's processor,
disassemble it, and then make a processor similar to it.
• Another type of reverse engineering involves producing 3-D images of
manufactured parts when a blueprint is not available in order to
remanufacture the part.
Pros and Cons...
• The pros are that if you do it right you can produce the item in question
without having to design it from scratch.
• The major con is that if you don’t follow some fairly complex rules you can
wind up in legal trouble for stealing the original manufacturer’s intellectual
property.
Thank You.

More Related Content

PPT
Software resuse
PDF
Software Maintenance and Evolution
PPT
Process Models IN software Engineering
PPT
Bse 3105 lecture 4-software re-engineering
PPTX
Software Reengineering
PPTX
Software reverse engineering
PPT
Software Reengineering
PPT
Software System Engineering - Chapter 1
Software resuse
Software Maintenance and Evolution
Process Models IN software Engineering
Bse 3105 lecture 4-software re-engineering
Software Reengineering
Software reverse engineering
Software Reengineering
Software System Engineering - Chapter 1

What's hot (20)

PPTX
Quality and productivity factors
PPTX
Software requirement and specification
PPT
Pressman ch-22-process-and-project-metrics
PPTX
Ch22-Software Engineering 9
PPTX
Software Reliability
PDF
Software engineering unit 1
PPTX
Maintenance, Re-engineering &Reverse Engineering in Software Engineering
PPTX
Ch1 introduction
DOCX
Designing and documenting software architecture unit 5
PPTX
S.D.L.C (Software Development Life Cycle.)
PPT
Software process and project metrics
PPTX
Case tools(computer Aided software Engineering)
PDF
Software Evolution
PPT
Software Re-engineering Forward & Reverse Engineering
PPTX
Computer Graphics - Introduction and CRT Devices
PPTX
PPTX
Software maintenance
PPTX
Presentation on software construction
PPT
Web Engineering
PPTX
Unified process model
Quality and productivity factors
Software requirement and specification
Pressman ch-22-process-and-project-metrics
Ch22-Software Engineering 9
Software Reliability
Software engineering unit 1
Maintenance, Re-engineering &Reverse Engineering in Software Engineering
Ch1 introduction
Designing and documenting software architecture unit 5
S.D.L.C (Software Development Life Cycle.)
Software process and project metrics
Case tools(computer Aided software Engineering)
Software Evolution
Software Re-engineering Forward & Reverse Engineering
Computer Graphics - Introduction and CRT Devices
Software maintenance
Presentation on software construction
Web Engineering
Unified process model
Ad

Similar to Reverse engineering in software engineering vaibhav (20)

PDF
Hacking with Reverse Engineering and Defense against it
PDF
International Journal of Engineering Research and Development
PDF
Software cracking and patching
PPTX
Reverse Engineering - Protecting and Breaking the Software
PPTX
Reverse engineering
PPTX
Reverse Engineering: Protecting and Breaking the Software
PPTX
Making reverse engineering fun
PPTX
Null bhopal 21042019_re_4w4r44
PPTX
Reverse code engineering
PDF
WhitePaperTemplate
PPTX
Reverse Engineering and It’s Basic by Prasenjit Kanti Paul.pptx
PDF
Demystifying Binary Reverse Engineering - Pixels Camp
PPTX
Reverse engineering
PPTX
Reverse Engineering: The Crash Course
PPTX
Reverse Engineering.pptx
PPTX
reverse_ee.pptx
PPTX
reverse.ppt.pptx
PPTX
Reverse Engineering 101
PDF
Reverse EngineeringReverse engineering is also a back engineering .pdf
PPTX
BSides Algiers - Reversing Win32 applications - Yacine Hebbal
Hacking with Reverse Engineering and Defense against it
International Journal of Engineering Research and Development
Software cracking and patching
Reverse Engineering - Protecting and Breaking the Software
Reverse engineering
Reverse Engineering: Protecting and Breaking the Software
Making reverse engineering fun
Null bhopal 21042019_re_4w4r44
Reverse code engineering
WhitePaperTemplate
Reverse Engineering and It’s Basic by Prasenjit Kanti Paul.pptx
Demystifying Binary Reverse Engineering - Pixels Camp
Reverse engineering
Reverse Engineering: The Crash Course
Reverse Engineering.pptx
reverse_ee.pptx
reverse.ppt.pptx
Reverse Engineering 101
Reverse EngineeringReverse engineering is also a back engineering .pdf
BSides Algiers - Reversing Win32 applications - Yacine Hebbal
Ad

More from Mani Kanth (20)

PPTX
White box testing
PPTX
Unit testing
PPTX
System testing
PPTX
management of maintainance
PPTX
Se (techniques for black box testing ppt)
PPTX
Mutation testing 1
PPTX
Mutation testing
PPTX
Guideline for euivalence class testing
PPTX
Equivalence class testing
PPTX
Deployment
PPTX
unit testing
PPTX
Window to viewport transformation&matrix representation of homogeneous co...
PPTX
The sutherland hodgeman polygon clipping algorithm
PPT
Seed filling algorithm
PPTX
Scaling and shearing
PPTX
Reflection transformation
PPTX
Raster and random scan display types of input devices
PPTX
Projection
PPTX
Polygon clipping with sutherland hodgeman algorithm and scan line fill algorithm
PPTX
Mid point circle algorithm
White box testing
Unit testing
System testing
management of maintainance
Se (techniques for black box testing ppt)
Mutation testing 1
Mutation testing
Guideline for euivalence class testing
Equivalence class testing
Deployment
unit testing
Window to viewport transformation&matrix representation of homogeneous co...
The sutherland hodgeman polygon clipping algorithm
Seed filling algorithm
Scaling and shearing
Reflection transformation
Raster and random scan display types of input devices
Projection
Polygon clipping with sutherland hodgeman algorithm and scan line fill algorithm
Mid point circle algorithm

Recently uploaded (20)

PDF
composite construction of structures.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Well-logging-methods_new................
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPT
Project quality management in manufacturing
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPT
Mechanical Engineering MATERIALS Selection
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Digital Logic Computer Design lecture notes
PPTX
Sustainable Sites - Green Building Construction
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
web development for engineering and engineering
composite construction of structures.pdf
Foundation to blockchain - A guide to Blockchain Tech
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Well-logging-methods_new................
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Project quality management in manufacturing
Lesson 3_Tessellation.pptx finite Mathematics
Mechanical Engineering MATERIALS Selection
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Lecture Notes Electrical Wiring System Components
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Digital Logic Computer Design lecture notes
Sustainable Sites - Green Building Construction
Embodied AI: Ushering in the Next Era of Intelligent Systems
CYBER-CRIMES AND SECURITY A guide to understanding
web development for engineering and engineering

Reverse engineering in software engineering vaibhav

  • 1. Reverse Engineering in Software Engineering By:- Vaibhav Dubey B.Tech(CSE) V
  • 2. Introduction • Reverse engineering is taking apart an object to see how it works in order to duplicate or enhance the object. The practice, taken from older industries, is now frequently used on computer hardware and software. Software reverse engineering involves reversing a program's machine code (the string of 0s and 1s that are sent to the logic processor) back into the source code that it was written in, using program language statements.
  • 3. Need • Software reverse engineering is done to retrieve the source code of a program because the source code was lost, to study how the program performs certain operations, to improve the performance of a program, to fix a bug (correct an error in the program when the source code is not available), to identify malicious content in a program such as a virus or to adapt a program written for use with one microprocessor for use with another.
  • 4. Tools • Hexadecimal Dumper: Prints or displays the binary numbers of a program in hexadecimal format (which is easier to read than a binary format). • Disassembler: Reads the binary code and then displays each executable instruction in text form. A disassembler cannot tell the difference between an executable instruction and the data used by the program. • Debugger : Allows the disassembler to avoid disassembling the data portions of a program.
  • 5. Types • Hardware reverse engineering involves taking apart a device to see how it works. For example, if a processor manufacturer wants to see how a competitor's processor works, they can purchase a competitor's processor, disassemble it, and then make a processor similar to it. • Another type of reverse engineering involves producing 3-D images of manufactured parts when a blueprint is not available in order to remanufacture the part.
  • 6. Pros and Cons... • The pros are that if you do it right you can produce the item in question without having to design it from scratch. • The major con is that if you don’t follow some fairly complex rules you can wind up in legal trouble for stealing the original manufacturer’s intellectual property.