To see the other types of publications on this topic, follow the link: Reverse engineering tools.

Journal articles on the topic 'Reverse engineering tools'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Reverse engineering tools.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Storey, Margaret-Anne D., Susan Elliott Sim, and Kenny Wong. "A collaborative demonstration of reverse engineering tools." ACM SIGAPP Applied Computing Review 10, no. 1 (2002): 18–25. http://dx.doi.org/10.1145/568235.568238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jarzabek, Stan, and Guosheng Wang. "Model-based design of reverse engineering tools." Journal of Software Maintenance: Research and Practice 10, no. 5 (1998): 353–80. http://dx.doi.org/10.1002/(sici)1096-908x(199809/10)10:5<353::aid-smr178>3.0.co;2-#.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dzhum, V. S., and V. A. Losev. "Analysis of network protocol reverse engineering tools." Information Security Questions, no. 1 (2021): 3–10. http://dx.doi.org/10.52190/2073-2600_2021_1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

TILLEY, SCOTT R., KENNY WONG, MARGARET-ANNE D. STOREY, and HAUSI A. MÜLLER. "PROGRAMMABLE REVERSE ENGINEERING." International Journal of Software Engineering and Knowledge Engineering 04, no. 04 (1994): 501–20. http://dx.doi.org/10.1142/s0218194094000246.

Full text
Abstract:
Program understanding can be enhanced using reverse engineering technologies. The understanding process is heavily dependent on both individuals and their specific cognitive abilities, and on the set of facilities provided by the program understanding environment. Unfortunately, most reverse engineering tools provide a fixed palette of extraction, selection, and organization techniques. This paper describes a programmable approach to reverse engineering. The approach uses a scripting language that enables users to write their own routines for common reverse engineering activities, such as graph layout, metrics, and subsystem decomposition, thereby extending the capabilities of the reverse engineering toolset to better suit their needs. A programmable environment supported by this approach subsumes existing reverse engineering systems by being able to simulate facets of each one.
APA, Harvard, Vancouver, ISO, and other styles
5

Yu, Hoyoung, Hansol Lee, Sangil Lee, Youngmin Kim, and Hyung-Min Lee. "Recent Advances in FPGA Reverse Engineering." Electronics 7, no. 10 (2018): 246. http://dx.doi.org/10.3390/electronics7100246.

Full text
Abstract:
In this paper, we review recent advances in reverse engineering with an emphasis on FPGA devices and experimentally verified advantages and limitations of reverse engineering tools. The paper first introduces essential components for programming Xilinx FPGAs (Xilinx, San Jose, CA, USA), such as Xilinx Design Language (XDL), XDL Report (XDLRC), and bitstream. Then, reverse engineering tools (Debit, BIL, and Bit2ncd), which extract the bitstream from the external memory to the FPGA and utilize it to recover the netlist, are reviewed, and their limitations are discussed. This paper also covers supplementary tools (Rapidsmith) that can adjust the FPGA design flow to support reverse engineering. Finally, reverse engineering projects for non-Xilinx products, such as Lattice FPGAs (Icestorm) and Altera FPGAs (QUIP), are introduced to compare the reverse engineering capabilities by various commercial FPGA products.
APA, Harvard, Vancouver, ISO, and other styles
6

Fülöp, Lajos Jenő, Péter Hegedűs, and Rudolf Ferenc. "BEFRIEND – a benchmark for evaluating reverse engineering tools." Periodica Polytechnica Electrical Engineering 52, no. 3-4 (2008): 153. http://dx.doi.org/10.3311/pp.ee.2008-3-4.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Valerga, A. P., M. Batista, R. Bienvenido, S. R. Fernández-Vidal, C. Wendt, and M. Marcos. "Reverse Engineering Based Methodology for Modelling Cutting Tools." Procedia Engineering 132 (2015): 1144–51. http://dx.doi.org/10.1016/j.proeng.2015.12.607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hainaut, J. L., V. Englebert, J. Henrard, J. M. Hick, and D. Roland. "Database reverse engineering: From requirements to CARE tools." Automated Software Engineering 3, no. 1-2 (1996): 9–45. http://dx.doi.org/10.1007/bf00126958.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Buonamici, Francesco, Monica Carfagni, Rocco Furferi, Lapo Governi, Alessandro Lapini, and Yary Volpe. "Reverse engineering modeling methods and tools: a survey." Computer-Aided Design and Applications 15, no. 3 (2017): 443–64. http://dx.doi.org/10.1080/16864360.2017.1397894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Narayan, John, Sandeep K. Shukla, and T. Charles Clancy. "A Survey of Automatic Protocol Reverse Engineering Tools." ACM Computing Surveys 48, no. 3 (2016): 1–26. http://dx.doi.org/10.1145/2840724.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Tiwari, Ms Nivedita, and Mr Lalji Prasad. "Reverse Engineering Tools for Simplifying Programming Environment through Flowcharting." International Journal of Engineering Trends and Technology 26, no. 2 (2015): 65–71. http://dx.doi.org/10.14445/22315381/ijett-v26p212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Valerga, A. P., M. Batista, J. Salguero, A. Gomez-Parra, and M. Marcos. "Reverse Engineering Based Methodology for Redesigning Contour Milling Tools." World Journal of Engineering and Technology 04, no. 03 (2016): 206–12. http://dx.doi.org/10.4236/wjet.2016.43d025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Canfora, G., A. Cimitile, and U. de Carlini. "A logic-based approach to reverse engineering tools production." IEEE Transactions on Software Engineering 18, no. 12 (1992): 1053–64. http://dx.doi.org/10.1109/32.184760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Schreve, K., C. L. Goussard, A. H. Basson, and D. Dimitrov. "Interactive Feature Modeling for Reverse Engineering." Journal of Computing and Information Science in Engineering 6, no. 4 (2006): 422–24. http://dx.doi.org/10.1115/1.2364205.

Full text
Abstract:
In feature based reverse engineering entities, or features, having higher level engineering meaning are used to approximate point data. This is in contrast to approximating the data with free form NURBS surfaces. Currently no such system is operationally available. Interactive feature based modeling tools for feature extraction, edge detection, and draft angle approximation are presented here. Several case studies demonstrate the application of these algorithms.
APA, Harvard, Vancouver, ISO, and other styles
15

WELCH, LONNIE R., GUOHUI YU, BINOY RAVINDRAN, et al. "REVERSE ENGINEERING OF COMPUTER-BASED CONTROL SYSTEMS." International Journal of Software Engineering and Knowledge Engineering 06, no. 04 (1996): 531–47. http://dx.doi.org/10.1142/s0218194096000223.

Full text
Abstract:
This article presents a process for the reengineering of computer-based control systems, and describes tools that automate portions of the process. The intermediate representation (IR) for capturing features of computer-based systems during reverse engineering is presented. A novel feature of the IR is that it incorporates the control system software architecture, a view that enables information to be captured at five levels of granularity: the program level, the task level, the package level, the subprogram level, and the statement level. A reverse engineering toolset that constructs the IR from Ada programs, displays the IR, and computes concurrency, communication and object-orientedness metrics is presented. Also described is the design of hypermedia techniques that enhance the usability of the reverse engineering tools.
APA, Harvard, Vancouver, ISO, and other styles
16

Beamud González, Elena María, Pedro Jose Núñez López, Eustaquio García Plaza, David Rodríguez Salgado, Alfonso González González, and Justo García Sanz-Calcedo. "Reverse Engineering Applied to the Teaching of Computer Aided Manufacturing." Materials Science Forum 903 (August 2017): 120–27. http://dx.doi.org/10.4028/www.scientific.net/msf.903.120.

Full text
Abstract:
One of the main shortcomings of individualized training in the use of computer aided design (CAD), and computer aided manufacturing (CAM) tools is that students lack a sound and broad understanding of the type of tools, and their specific and integrated applications in industrial manufacturing. This study aimed to design an integrated curricular training programme in computer aided tools for the design and manufacture of mechanical components based on reverse engineering techniques. By using real products that students can see and touch, a scanned copy is obtained for subsequent reconstruction into a virtual three-dimensional model using the software for optimizing the point cloud, meshing, and creating both the surface and solid. Once the virtual three-dimensional model has been obtained, it is exported to a solid modelling CAD (3D-CAD) software for modification according to the geometrical requirements. The next step is for students to manufacture a component using rapid prototyping techniques, which allow them to visualize, analyse, and inspect a component to optimize its design. The use of computer aided manufacturing software enables students to design and plan machining operations virtually to obtain a computer numeric control (CNC) program for the manufacture of a component with a CNC machine tool. Finally, students perform a quality control of the component by employing a range of measurement techniques. This training program is integrated into the subjects of the mechanical engineering degree, where students can work with these tools in line with an intergraded curriculum.
APA, Harvard, Vancouver, ISO, and other styles
17

Popişter, Florin, Daniela Popescu, Andrei Șteopan, and Monica Steopan. "Approach for Obtaining Broken Plastic Parts Using Reverse Engineering Tools." Applied Mechanics and Materials 808 (November 2015): 226–32. http://dx.doi.org/10.4028/www.scientific.net/amm.808.226.

Full text
Abstract:
Reverse engineering process has been demonstrated to be reliable solution in solving problems regarding missing information and/or details referred to the functional areas of parts. Based on the specific activities of the chain of processes that defines the reverse engineering concept it can be collected essential information in order to reconstitute important zones of broken parts. The present paper describes an approach that was used to recover a plastic gear part. The case study provided a moulded injected plastic part that was broken during the normal function. The entire process supposed scanning the toothed area that remained and rebuild the contour that was used in CAM software as input data and especially the machining strategy used to perform both sides of the part. The machining process was employed on a CNC graving machine tool.
APA, Harvard, Vancouver, ISO, and other styles
18

Duchêne, Julien, Colas Le Guernic, Eric Alata, Vincent Nicomette, and Mohamed Kaâniche. "State of the art of network protocol reverse engineering tools." Journal of Computer Virology and Hacking Techniques 14, no. 1 (2017): 53–68. http://dx.doi.org/10.1007/s11416-016-0289-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Setia, Tesa Pajar, Aldy Putra Aldya, and Nur Widiyasono. "Reverse Engineering untuk Analisis Malware Remote Access Trojan." Jurnal Edukasi dan Penelitian Informatika (JEPIN) 5, no. 1 (2019): 40. http://dx.doi.org/10.26418/jp.v5i1.28214.

Full text
Abstract:
Para hacker menggunakan malware Remote Access Trojan untuk merusak sistem kemudian mencuri data para korbannya. Diperlukan analisis mendalam mengenai malware baru-baru ini karena malware dapat berkamuflase seperti sistem tidak dicurigai. Penggunaan teknik basic analysis sangat tergantung pada perilaku malware yang dianalisis, analisis akan sulit ketika ditemukan malware baru yang menggunakan suatu teknik baru. Reverse engineering merupakan salah satu solusi untuk melakukan analisis malware karena menggunakan teknik reverse engineering kode pada malware dapat diketahui. Malware Flawed ammyy ini merupakan software yang disalahgunakan dari Ammyy Admin versi 3 oleh hacker TA505. Penelitian ini bertujuan untuk bagaimana alur untuk melakukkan identikasi malware kususnya malware RAT dengan teknik reverse engineering dan tools yang bias digunakan. Penelitian ini menggunakan metodologi deskriptif,. Hasil dari penelitian menunjukan bahwa alur untuk melakukan reverse engineering dan tools yang dapat digunakan.
APA, Harvard, Vancouver, ISO, and other styles
20

Sija, Baraka D., Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim. "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/8370341.

Full text
Abstract:
A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE) and classifies them into four divisions, approaches that reverse engineer protocol finite state machines, protocol formats, and both protocol finite state machines and protocol formats to approaches that focus directly on neither reverse engineering protocol formats nor protocol finite state machines. The efficiency of all approaches’ outputs based on their selected inputs is analyzed in general along with appropriate reverse engineering inputs format. Additionally, we present discussion and extended classification in terms of automated to manual approaches, known and novel categories of reverse engineered protocols, and a literature of reverse engineered protocols in relation to the seven layers’ OSI (Open Systems Interconnection) model.
APA, Harvard, Vancouver, ISO, and other styles
21

Yan, Zhi Bo, and Hong Wei Chen. "Reverse Engineering in the Manufacturing of Forming Die." Applied Mechanics and Materials 88-89 (August 2011): 10–15. http://dx.doi.org/10.4028/www.scientific.net/amm.88-89.10.

Full text
Abstract:
Reverse Engineering, also known as reverse engineering, new products has become an important way for design and development is one of the field of advanced manufacturing in recent years, the research focus. This paper discusses the surface information acquisition, surface reconstruction, CAD model creation and stamping blank reverse key technologies to solve the conventional time-consuming measurements, detection is difficult and costly problem; more complete establishment of a suitable complex stamping die reverse engineering methods and tools, dies for similar products in reverse reference.
APA, Harvard, Vancouver, ISO, and other styles
22

Oancea, Gheorghe, Alexandru Manolescu, Iulian Bădan, and Roxana Pescaru. "Customized Software Tools Integrated in Reverse Engineering Process of Rectangular Parts with Holes." Applied Mechanics and Materials 371 (August 2013): 473–77. http://dx.doi.org/10.4028/www.scientific.net/amm.371.473.

Full text
Abstract:
This paper presents how in the Reverse Engineering process can be integrated specific software tools, developed by the authors, which allow for digitized rectangular parts with internal surfaces of revolution, to obtain solid models and CNC program. The first tool named Rotational Axis Primitives and Recognition has implemented a set of algorithms and it is used for recognizing, from a cloud of points associated with a rotational part, the axis and geometrical parameters. The second tool named Hole_Application is created for forward engineering and it can be used to design and manufacture the industrial products with rectangular shape using intelligent technological objects for holes.
APA, Harvard, Vancouver, ISO, and other styles
23

Way, Yusof, Muhammad Ridhuan Kamarudin, and Noor Iliana Mohd Salimi. "The Application of Reverse Engineering Tools and Rapid Prototyping Technology in Developing Automotive Components." Advanced Materials Research 576 (October 2012): 633–36. http://dx.doi.org/10.4028/www.scientific.net/amr.576.633.

Full text
Abstract:
The important of Reverse Engineering (RE) and Rapid Prototyping (RP) process in the automotive sector has made the knowledge of its operation vital to engineers and designers. The purpose of this research is to apply and implement the RE and RP process and also integrate advance quality tools in the development of automotive components. The advance quality tools that been implemented are Quality Function Deployment (QFD) and Failure Mode Effect Analysis (FMEA). To produce the final products, a machine that works under Fused Deposition Modeling (FDM) principle is used. A manual window crank as the automotive component has been selected as the product for this paper and application. Before continuing the fabrication of product, the design improvement of the target product to a better product level is done through the QFD and FMEA as the advance quality tools. The analysis from QFD and FMEA tool is then translated into the design and product development.
APA, Harvard, Vancouver, ISO, and other styles
24

Hoole, Samuel Ratnajeevan Herbert, Thiruchelvam Arudchelvam, and Janaka Wijayakulasooriya. "Reverse Engineering Legacy Finite Element Code." Materials Science Forum 721 (June 2012): 307–12. http://dx.doi.org/10.4028/www.scientific.net/msf.721.307.

Full text
Abstract:
The development of code for finite elements-based field computation has been going on at a pace since the 1970s, yielding code that was not put through the software lifecycle – where code is developed through a sequential process of requirements elicitation from the user/client to design, analysis, implementation and testing and release and maintenance. As a result, today we have legacy code running into millions of lines, implemented without planning and not using proper state-of-the-art software design tools. It is necessary to redo this code to exploit new object oriented facilities and make corrections or run on the web with Java. Object oriented code’s principal advantage is reusability. Recent advances in software make such reverse engineering/re-engineering of this code into object oriented form possible. The purpose of this paper is to show how existing finite element code can be reverse/re-engineered to improve it. Taking sections of working finite element code, especially matrix computation for equation solution as examples, we put it through reverse engineering to arrive at the effective UML design by which development was done and then translate it to Java. This then is the starting point for analyzing the design and improving it without having to throw away any of the old code. Using auto-translators and then visually rewriting parts by the design so revealed, has no match in terms of speed and efficiency of re-engineering legacy code.
APA, Harvard, Vancouver, ISO, and other styles
25

Hübler, Michael, Deepak Narayanan, and Michael Müller. "Efficient retrofitting of vessels by using simulation tools and reverse engineering technologies." International Shipbuilding Progress 63, no. 3-4 (2017): 109–36. http://dx.doi.org/10.3233/isp-170125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Ullah, AMM, and Khalifa Harib. "Tutorials for Integrating CAD/CAM in Engineering Curricula." Education Sciences 8, no. 3 (2018): 151. http://dx.doi.org/10.3390/educsci8030151.

Full text
Abstract:
This article addresses the issue of educating engineering students with the knowledge and skills of Computer-Aided Design and Manufacturing (CAD/CAM). In particular, three carefully designed tutorials—cutting tool offsetting, tool-path generation for freeform surfaces, and the integration of advanced machine tools (e.g., hexapod-based machine tools) with solid modeling—are described. The tutorials help students gain an in-depth understanding of how the CAD/CAM-relevant hardware devices and software packages work in real-life settings. At the same time, the tutorials help students achieve the following educational outcomes: (1) an ability to apply the knowledge of mathematics, science, and engineering; (2) an ability to design a system, component, or process to meet the desired needs, (3) an ability to identify, formulate, and solve engineering problems; and (4) an ability to use the techniques, skills, and modern engineering tools that are necessary for engineering practice. The tutorials can be modified for incorporating other contemporary issues (e.g., additive manufacturing, reverse engineering, and sustainable manufacturing), which can be delved into as a natural extension of this study.
APA, Harvard, Vancouver, ISO, and other styles
27

JAHNKE, JENS H., and ANDREW WALENSTEIN. "EVALUATING THEORIES FOR MANAGING IMPERFECT KNOWLEDGE IN HUMAN-CENTRIC DATABASE REENGINEERING ENVIRONMENTS." International Journal of Software Engineering and Knowledge Engineering 12, no. 01 (2002): 77–102. http://dx.doi.org/10.1142/s0218194002000834.

Full text
Abstract:
Modernizing heavily evolved and poorly documented information systems is a central software engineering problem in our current IT industry. It is often necessary to reverse engineer the design documentation of such legacy systems. Several interactive CASE tools have been developed to support this human-intensive process. However, practical experience indicates that their applicability is limited because they do not adequately handle imperfect knowledge about legacy systems. In this paper, we investigate the applicability of several major theories of imperfect knowledge management in the area of soft computing and approximate reasoning. The theories are evaluated with respect to how well they meet requirements for generating effective human-centred reverse engineering environments. The requirements were elicited with help from practical case studies in the area of database reverse engineering. A particular theory called "possibilistic logic" was found to best meet these requirements most comprehensively. This evaluation highlights important challenges to the designers of knowledge management techniques, and should help reverse engineering tool implementers select appropriate technologies.
APA, Harvard, Vancouver, ISO, and other styles
28

Kleber, Stephan, Lisa Maile, and Frank Kargl. "Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis." IEEE Communications Surveys & Tutorials 21, no. 1 (2019): 526–61. http://dx.doi.org/10.1109/comst.2018.2867544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Chandra, C., and C. V. Ramamoorthy. "An Evaluation of Knowledge Engineering Approaches to the Maintenance of Evolutionary Software." International Journal of Software Engineering and Knowledge Engineering 08, no. 01 (1998): 3–20. http://dx.doi.org/10.1142/s0218194098000030.

Full text
Abstract:
Reverse engineering and reengineering are two major research challenges in the software maintenance process. Reverse engineering is the process of rederiving the specification of a program; and reengineering is the process of modifying an already existing software to add additional functionalities or to correct any malfunction. The difficulty in these tasks are that software development commonly involves many software engineers with implicit assumptions about the behavior of each module. These assumptions are not documented and often leads to inconsistencies in the code. During reverse engineering, such assumptions may not be uncovered. These assumptions usually have complex dependencies, and are the cause of a lot of bugs when the software is reengineered. Many approaches and prototype tools have been developed to address these issues. Reverse engineering and automated program understanding tools have been developed to support the reverse engineering tasks; while various theoretical works on structural program analysis and programs for automated ripple effect analysis have attempted to deal with the reengineering process. These works can be classified into two main types of approaches: those using shallow knowledge or knowledge about the structure of the system and those utilizing deep knowledge or knowledge about the semantics and behavior of the software system. In this paper, we attempt to survey works that have been done under these two broad categories of approaches to deal with the software maintenance tasks, evaluate the strengths and drawbacks of each approach, and attempt to draw a conclusion on the advantages and disadvantages of the two main lines of approaches.
APA, Harvard, Vancouver, ISO, and other styles
30

Pop, Andrei, Andrei Adam, and Adrian Pop. "Reverse Engineering Tehnique Applied for Manufacturing Thin Wall Plastic Parts." Applied Mechanics and Materials 772 (July 2015): 212–17. http://dx.doi.org/10.4028/www.scientific.net/amm.772.212.

Full text
Abstract:
Development of design software in the last two decades has led to marketing products with complex shapes; which, cannot be materialized without the aid of the computer. For some product development processes, reverse engineering (RE) allows generating surface models by three-dimensional scanning techniques, and consequently this methodology permits to manufacture different parts and tools , shortening the development time. The paper presents a redesign process applied on a thin walled plastic component using the Reverse Engineering technique. The part was scanned, modified and subject to simulations that will certity the flow and filling of the cavity.
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Li Zhong, Dong Dong Zhang, Jin Liang, and Xiao Bo Liao. "Research and Application of 3D Digital Detection Technology in Reverse Engineering." Applied Mechanics and Materials 490-491 (January 2014): 1517–21. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1517.

Full text
Abstract:
In recent years, more and more class-A surfaces are adopted for product processing, both in the traditional industries and new industries, which proposes high requirements for the detection technique of product. This article describes the method of size detection in detail. Combining with the principle of reverse engineering, the XJTUOM and XJTUDP systems are used for the 3D digital measurement and design of the large sculpture. The digital detection technology combined with computer aided tools will have a more widespread and profound application in reverse engineering.
APA, Harvard, Vancouver, ISO, and other styles
32

Popescu, Diana, Dan Lăptoiu, Rodica Marinescu, Anton Hadar, and Iozefina Botezatu. "Advanced Engineering in Orthopedic Surgery Applications." Key Engineering Materials 752 (August 2017): 99–104. http://dx.doi.org/10.4028/www.scientific.net/kem.752.99.

Full text
Abstract:
The paper reports the use of advanced engineering tools, techniques and manufacturing process for the preoperative planning, visualization and simulation of complex osteotomy of a diabetic foot (Charcot osteoarthropathy). Two case studies focused on the same clinical data are illustrating the use of medical modeling techniques, reverse engineering and Additive Manufacturing technology in the development of 3D printed anatomical model and customized surgical cutting guides, as well as the use of Augmented Reality (AR) tools for enhancing the communication and information exchange between surgeons, and between surgeons and engineers. A good and accurate communication surgeon-engineer in identifying and selecting anatomical landmarks and supporting surfaces, in establishing the resections trajectories and K-wires positions proved mandatory for the guides’ design process. The importance of using both 3D virtual models, AR models and physical models as collaboration tools is also discussed.
APA, Harvard, Vancouver, ISO, and other styles
33

Peterka, Jozef, Ladislav Morovič, Peter Pokorný, Martin Kováč, and František Hornák. "Optical 3D Scanning of Cutting Tools." Applied Mechanics and Materials 421 (September 2013): 663–67. http://dx.doi.org/10.4028/www.scientific.net/amm.421.663.

Full text
Abstract:
The paper shortly illustrates the general concept of Reverse Engineering, which includesalso the 3D scanning. In the main part of the paper the concrete 3D scanning process of chosen individual objects are described. The problems that occurred during 3D digitizing of individual parts are step by step discussed and solved. The paper deals with 3D scanning of ball nose end mills and screw drill. The article gives a procedure for digitizing and comparing the results of the scanned digital models of the two ball nose end mills and screw drill.
APA, Harvard, Vancouver, ISO, and other styles
34

Eka Pratama, I. Putu Agus, and Anak Agung Bagus Arya Wiradarma. "IMPLEMENTASI KATOOLIN SEBAGAI PENETRASI TOOLS KALI LINUX PADA LINUX UBUNTU 16.04 (STUDI KASUS: REVERSE ENGINEERING FILE .APK)." Jurnal RESISTOR (Rekayasa Sistem Komputer) 1, no. 2 (2018): 86–93. http://dx.doi.org/10.31598/jurnalresistor.v1i2.278.

Full text
Abstract:
The Linux Operating System is known for its open-source characteristic which means everyone is free to develop Linux with the use of available source code. The result of Linux development is called Linux distribution (Distro). There are various Linux distributions in accordance with their respective uses, one of them is Kali Linux. Kali Linux is a Linux distro that is developed to penetrate the security of computer systems. Kali Linux uses a variety of tools to perform its functions. However, for users who want to use the functionality of Kali Linux without having to change the Linux distro that has been used, the user can use Katoolin. Katoolin can provide the convenience and flexibility for users who want to use Kali Linux as a special Linux distro for the purpose of penetrating computer system security without having to replace the distro that has been used or do a full install of Kali Linux. One case study that can be solved using the Kali Kali Linux based tool on Katoolin is Reverse Engineering. The case study was solved using one of the tools in the Reverse Engineering category named apktool that available on Katoolin.
APA, Harvard, Vancouver, ISO, and other styles
35

Pathak, Vimal Kumar, Chitresh Nayak, Amit Kumar Singh, and Himanshu Chaudhary. "A VIRTUAL REVERSE ENGINEERING METHODOLOGY FOR ACCURACY CONTROL OF TRANSTIBIAL PROSTHETIC SOCKET." Biomedical Engineering: Applications, Basis and Communications 28, no. 05 (2016): 1650037. http://dx.doi.org/10.4015/s101623721650037x.

Full text
Abstract:
Computer-aided tools help in shortening and eradicating numerous repetitive tasks that reduce the gap between digital model and the actual product. Use of these tools assist in realizing free-form objects such as custom fit products as described by an stringent interaction with the human body. Development of such model presents a difficult situation for reverse engineering (RE), which are not analogous with the requirement for generating simple geometric models. Hence, an alternating way of producing more accurate three-dimensional models is proposed. For creating accurate 3D models, point clouds are processed through filtering technique, segmentation, mesh smoothing and surface generation. These processes help in converting the initial unorganized point data into a 3D digital model and simultaneously influence the quality of the model. This study provides an optimum balance for the best accuracy obtainable with maximum allowable deviation to lesser computer handling and processing time. In this paper, a realistic nontrivial case study of the free-form prosthetic socket is considered. The accuracy obtained for the developed model is acceptable for the use in medical applications and FEM analysis.
APA, Harvard, Vancouver, ISO, and other styles
36

Pathak, Vimal Kumar, Chitresh Nayak, Amit Kumar Singh, and Himanshu Chaudhary. "An Integrated Reverse Engineering Approach for Accuracy Control of Free-Form Objects." Archive of Mechanical Engineering 63, no. 4 (2016): 647–63. http://dx.doi.org/10.1515/meceng-2016-0037.

Full text
Abstract:
Abstract Computer-aided tools help in shortening and eradicating numerous repetitive tasks that reduces the gap between digital model and actual product. Use of these tools assists in realizing free-form objects such as custom fit products as described by a stringent interaction with the human body. Development of such a model presents a challenging situation for reverse engineering (RE) which is not analogous with the requirement for generating simple geometric models. Hence, an alternating way of producing more accurate three-dimensional models is proposed. For creating accurate 3D models, point clouds are processed through filtering, segmentation, mesh smoothing and surface generation. These processes help in converting the initial unorganized point data into a 3D digital model and simultaneously influence the quality of model. This study provides an optimum balance for the best accuracy obtainable with maximum allowable deviation to lessen computer handling and processing time. A realistic non trivial case study of free-form prosthetic socket is considered. The accuracy obtained for the developed model is acceptable for the use in medical applications and FEM analysis.
APA, Harvard, Vancouver, ISO, and other styles
37

Al-Zaghameem, Abdullah O. "Evaluating the Role of Software Visualization Techniques as Assistant Tools in Software Reverse Engineering." International Journal of Software Engineering and Its Applications 12, no. 3 (2018): 39–50. http://dx.doi.org/10.14257/ijseia.2018.12.3.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Che, Jiaqi, Yanwen Zhang, Hanxiang Wang, et al. "A novel method for analyzing working performance of milling tools based on reverse engineering." Journal of Petroleum Science and Engineering 197 (February 2021): 107987. http://dx.doi.org/10.1016/j.petrol.2020.107987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Giannone, A., and P. Maresca. "The use of metagrammars to help construct reverse engineering tools for existing software comprehension." Engineering Applications of Artificial Intelligence 8, no. 3 (1995): 345–54. http://dx.doi.org/10.1016/0952-1976(95)00006-m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Stănăşel, Iulian, Florin Blaga, Traian Buidoş, and Dan Crăciun. "Reverse engineering and CAD-CAM approach for manufacturing of spare parts. Case study." MATEC Web of Conferences 184 (2018): 03004. http://dx.doi.org/10.1051/matecconf/201818403004.

Full text
Abstract:
Reverse engineering represents a method to retrieve information from an existing product, information which are then used for designing a new product or to reproduce it in order to make spare parts. In this paper is presented a case study on making a spare part of complex shape from a worn part. There are presented the stages of acquisition of data by scanning, the use of reverse engineering for the realization of the 3D model, the virtual manufacturing and then the machining of the workpiece CNC machine tools.
APA, Harvard, Vancouver, ISO, and other styles
41

Li, Tian, Si Yuan Cheng, Xue Peng Wang, and Xue Rong Yang. "Repairing Incomplete Measured Data for Reverse Engineering with Anatomical CAD." Applied Mechanics and Materials 271-272 (December 2012): 1087–92. http://dx.doi.org/10.4028/www.scientific.net/amm.271-272.1087.

Full text
Abstract:
The repairing of incomplete measured data caused by the inaccessibility or invisibility of some portions of the product surface for measure tools plays an important role in Reverse Engineering. The fundamental principles of Reverse Engineering and Anatomical CAD are introduced. The main functional advantages of 3-matic package integrated with Anatomical CAD are presented. There is a big difference in the working flows between Anatomical CAD and traditional CAD packages in the process of RE data repairing. In this paper, we propose a new method of data repairing based on Anatomical CAD. The point cloud of the stamping part obtained by a Potable CMM is repaired successfully by 3-matic, which reduces preparation times by working with a triangular mesh directly, and saves the turn-around time and works more effectively.
APA, Harvard, Vancouver, ISO, and other styles
42

Li, Wei Zhen, and Song Hao Wang. "Pre-Deformed Design of Optical Lenses with Reverse Engineering and Virtual Manufacturing." Applied Mechanics and Materials 599-601 (August 2014): 391–95. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.391.

Full text
Abstract:
For higher geometrical accuracy requirement of optical lens, much research has been conducted either by changing the injection process parameters or changing the material of the mold or the mold manufacturing process. Although some degree of improvements was achieved, those were occasional but not-repeatable. One conventional procedure has been: the injection mold core must be polished several times to obtain qualified lens product in preproduction trial, very uneconomical and inefficient. In this paper, modern engineering tools were applied to simplify the correction process in optical lens fabrication. Combining virtual manufacturing with reverse engineering technology, the method was demonstrated very powerful. For the optical lens of 70x29.1mm in this research, the maximum deviation from the flatness after regular plastic injection molding was 0.208mm. While with combined technology of VM and RE the error was reduced to 0.008mm only by once iteration with an improvement of 96.15%. Not only the technology could be extended to larger or more challenging lens fabrication, it could also be applied to curved surfaces. This is really great tool to achieve higher quality optical lens production with much lower expending in labor and funding.
APA, Harvard, Vancouver, ISO, and other styles
43

Fukuda, Kazumasa, and Haruaki Tamada. "To Prevent Reverse-Enginnering Tools by Shuffling the Stack Status with Hook Mechanism." International Journal of Software Innovation 3, no. 3 (2015): 14–25. http://dx.doi.org/10.4018/ijsi.2015070102.

Full text
Abstract:
In this paper, we propose an obfuscation method to shuffle the stack status for preventing illegal analysis from crackers. Generally, crackers tries building a call flow graph of a program to clarify its behaviors. The call flow graph represents relations among methods, and helps comprehension of a program. On the other hand, a callee is fixed by a method name and the stack status in object oriented languages. Then, changing a stack status causes changing a callee when the callee is overloaded. Therefore, we focus on a hook mechanism to change a callee at runtime by changing the stack status. The program applied our method makes a fake call flow graph (CFG) from reverse-engineering tools, and the fake CFG leads misunderstanding of the program. We conducted two experiments to evaluate the proposed method. First is to evaluate the tolerance against existing reverse-engineering tools: Soot, Jad, Procyon, and Krakatau. The Procyon only succeeded decompilation, the others crashed. Second is to evaluate understandability of the program obfuscated by our method. Only one subject in the nine subjects answered the correct value. The experiments show the proposed method leads misunderstanding even if the target program is tiny and simple.
APA, Harvard, Vancouver, ISO, and other styles
44

ELotmani, Fouad, Redouane Esbai, and Mohamed Atounti. "The Reverse Engineering of a Web Application Struts Based in the ADM Approach." International Journal of Online and Biomedical Engineering (iJOE) 16, no. 02 (2020): 112. http://dx.doi.org/10.3991/ijoe.v16i02.11213.

Full text
Abstract:
&lt;p&gt;Since web technologies are constantly evolving, the adaptation of legacy web applications to new paradigms such as rich internet applications (RIAs) is become a necessity. In such tendencies, we notice that several web leaders has already migrated their web applications to RIAs. However, it faces many challenges due to the variety of frameworks. Nevertheless, and in order to facilitate the process of migration, it would be ideal to use tools that could help automatically generate or ease the generation of UML (Unified Modeling Language) models from legacy web application. In this context, novel technical frameworks used for information integration and migration processes such as Architecture-Driven Modernization Task Force (ADMTF) were fashioned to describe specifications and promote industry accord on the modernization of existing applications. In this paper, we propose a process for migrating application from Struts to UML model using ADM standards and MoDisco. We then present a case study as an example illustrating the different steps of the proposed process. We then validated the proposition within Eclipse Modelling Framework since a number of its tools and run-time environments are indeed aligned with ADM standards.&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
45

Canfora, G., A. Cimitile, and U. de Carlini. "Correction to 'A4 logic-based approach to reverse engineering tools production (Dec 92 1053-1064)." IEEE Transactions on Software Engineering 19, no. 6 (1993): 640. http://dx.doi.org/10.1109/32.232029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Goebel, Michael, Jason Bunk, Srinjoy Chattopadhyay, Lakshmanan Nataraj, Shivkumar Chandrasekaran, and B. S. Manjunath. "Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions." Electronic Imaging 2021, no. 4 (2021): 300–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.4.mwsf-300.

Full text
Abstract:
Machine Learning (ML) algorithms are susceptible to adversarial attacks and deception both during training and deployment. Automatic reverse engineering of the toolchains behind these adversarial machine learning attacks will aid in recovering the tools and processes used in these attacks. In this paper, we present two techniques that support automated identification and attribution of adversarial ML attack toolchains using Co-occurrence Pixel statistics and Laplacian Residuals. Our experiments show that the proposed techniques can identify parameters used to generate adversarial samples. To the best of our knowledge, this is the first approach to attribute gradient based adversarial attacks and estimate their parameters. Source code and data is available at: &lt;ext-link ext-link-type="url" xlink:href="https://github.com/michael-goebel/ei_red"&gt;https://github.com/michael-goebel/ei_red&lt;/ext-link&gt;.
APA, Harvard, Vancouver, ISO, and other styles
47

Nanthaamornphong, Aziz, Jeffrey Carver, Karla Morris, and Salvatore Filippone. "Extracting UML Class Diagrams from Object-Oriented Fortran: ForUML." Scientific Programming 2015 (2015): 1–15. http://dx.doi.org/10.1155/2015/421816.

Full text
Abstract:
Many scientists who implement computational science and engineering software have adopted the object-oriented (OO) Fortran paradigm. One of the challenges faced by OO Fortran developers is the inability to obtain high level software design descriptions of existing applications. Knowledge of the overall software design is not only valuable in the absence of documentation, it can also serve to assist developers with accomplishing different tasks during the software development process, especially maintenance and refactoring. The software engineering community commonly uses reverse engineering techniques to deal with this challenge. A number of reverse engineering-based tools have been proposed, but few of them can be applied to OO Fortran applications. In this paper, we propose a software tool to extract unified modeling language (UML) class diagrams from Fortran code. The UML class diagram facilitates the developers' ability to examine the entities and their relationships in the software system. The extracted diagrams enhance software maintenance and evolution. The experiments carried out to evaluate the proposed tool show its accuracy and a few of the limitations.
APA, Harvard, Vancouver, ISO, and other styles
48

Singh, Divya, and Richa Pandey. "A New Proposed Method to Reverse Engineer a Residual Limb for Prosthetic Socket - Procedure, Advantages and Challenges." Applied Mechanics and Materials 852 (September 2016): 558–63. http://dx.doi.org/10.4028/www.scientific.net/amm.852.558.

Full text
Abstract:
A prosthetic replaces any missing human body part visibly and also aims to resume the normal functionality of the part. Reverse engineering extracts information from a present model or available design and develops a new model using advanced CAD tools. Nowadays the reverse engineered part can be combined with rapid prototyping by various software and integration of CAD-CAM platforms. In this paper, a new method to reverse engineer the residual limb information for lower limb amputees, in order to use it for analyzing and developing a prosthetic socket by scanning and developing a CAD model is proposed. Along this are discussed, the advantages and challenges. This work falls in the emerging field of interdisciplinary engineering, combining medical and advanced mechanical engineering on a humanitarian platform
APA, Harvard, Vancouver, ISO, and other styles
49

Liang, Hong Qiang, Li Yuan, Wei Peng, and Ping Yu Zhu. "Rapid Reverse Modeling for a Boring Bar with Complex Surface." Advanced Materials Research 819 (September 2013): 414–18. http://dx.doi.org/10.4028/www.scientific.net/amr.819.414.

Full text
Abstract:
For some product development processes, reverse engineering (RE) allows to generate surface models by using the coordinate measuring machine (CMM) scanning technique, for this methodology permits to manufacture different tools in a short development period. A case study on a boring bar with complex surface is present for a brief overview of RE and provide benefits to improve the efficiency of designing and production processes. In order to guarantee the precision of the boring bar model, two methods of software Imageware for rule surface reconstruction and NURBS fitting are used. According to compare experimental modal data with simulation modal data, verified the viability of rapid reverse modeling for damping boring bar.
APA, Harvard, Vancouver, ISO, and other styles
50

Arnatovich, Yauhen Leanidavich, Lipo Wang, Ngoc Minh Ngo, and Charlie Soh. "A Comparison of Android Reverse Engineering Tools via Program Behaviors Validation Based on Intermediate Languages Transformation." IEEE Access 6 (2018): 12382–94. http://dx.doi.org/10.1109/access.2018.2808340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!