Analysis and Contemplation of Reverse Engineering Techniques

Conference: Fifth International Conference on Advances in Computer Engineering
Author(s): Romil Gandhi, Madhuri Gedam, Sachin Bojewar Year: 2014
Grenze ID: 02.ACE.2014.5.522 Page: 202-209

Abstract

This paper discusses different uses of reverse engineering (RE), as well as the change in its original use for beneficial purposes to negative ones. A comparative study of different techniques used for RE is performed, and proposals to improve security are made. These include the obfuscation technique used for Java, and protection from RE using the proposed hardware system.

<< BACK

ACE - 2014