Analysis and Contemplation of Reverse Engineering Techniques
Conference: Fifth International Conference on Advances in Computer Engineering
AbstractThis paper discusses different uses of reverse engineering (RE), as well as the change in its original use for beneficial purposes to negative ones. A comparative study of different techniques used for RE is performed, and proposals to improve security are made. These include the obfuscation technique used for Java, and protection from RE using the proposed hardware system. |
ACE - 2014![]() |