Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,182,834 papers from all fields of science
Search
Sign In
Create Free Account
Reverse engineering
Known as:
Sujar as mãos
, Reverse
, Reverse-engineering
Expand
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Agent systems reference model
Algorithmic trading
Another World
BIOS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Erays: Reverse Engineering Ethereum's Opaque Smart Contracts
Yi Zhou
,
Deepak Kumar
,
Surya Bakshi
,
Joshua Mason
,
Andrew K. Miller
,
Michael Bailey
USENIX Security Symposium
2018
Corpus ID: 52046611
Interacting with Ethereum smart contracts can have potentially devastating financial consequences. In light of this, several…
Expand
Highly Cited
2014
Highly Cited
2014
Query reverse engineering
Quoc Trung Tran
,
C. Chan
,
S. Parthasarathy
The VLDB journal
2014
Corpus ID: 6283056
In this paper, we introduce a new problem termed query reverse engineering (QRE). Given a database $$D$$D and a result table $$T…
Expand
Review
2011
Review
2011
The state-of-the-art in semiconductor reverse engineering
R. Torrance
,
D. James
Design Automation Conference
2011
Corpus ID: 18906329
This presentation gives an overview of the place of reverse engineering (RE) in the semiconductor industry, and the techniques…
Expand
Highly Cited
2008
Highly Cited
2008
Reverse-Engineering a Cryptographic RFID Tag
K. Nohl
,
David Evans
,
Starbug
,
H. Plötz
USENIX Security Symposium
2008
Corpus ID: 7473524
The security of embedded devices often relies on the secrecy of proprietary cryptographic algorithms. These algorithms and their…
Expand
Highly Cited
2008
Highly Cited
2008
Reverse Engineering : Google's Innovation Machine
Bala R. Iyer
,
T. Davenport
2008
Corpus ID: 168267430
Much of the company's astounding success is rooted in its legendary IT infrastructure, but that's not the whole story. At Google…
Expand
Highly Cited
2003
Highly Cited
2003
GUI ripping: reverse engineering of graphical user interfaces for testing
A. Memon
,
Ishan Banerjee
,
Adithya Nagarajan
10th Working Conference on Reverse Engineering…
2003
Corpus ID: 15594335
Graphical user interfaces (GUIs) are important parts oftoday's software and their correct execution is required toensure the…
Expand
Highly Cited
2001
Highly Cited
2001
Reverse Engineering and Redesign: Courses to Incrementally and Systematically Teach Design
K. Wood
,
Dan Jensen
,
Joseph Bezdek
,
K. Otto
2001
Corpus ID: 109416903
A variety of design‐process and design‐methods courses exist in engineering education. The primary objective of such courses is…
Expand
Highly Cited
2000
Highly Cited
2000
Reverse engineering: a roadmap
H. Müller
,
J. Weber
,
Dennis B. Smith
,
M. Storey
,
S. Tilley
,
Kenny Wong
International Conference on Software Engineering
2000
Corpus ID: 207701477
By the early 1990s the need for reengineering legacy systems was already acute, but recently the demand has increased…
Expand
Highly Cited
1999
Highly Cited
1999
Feature-based reverse engineering of mechanical parts
W. Thompson
,
J. Owen
,
H. J. D. S. Germain
,
S. Stark
,
T. Henderson
IEEE Trans. Robotics Autom.
1999
Corpus ID: 6668216
Reverse engineering of mechanical parts requires extraction of information about an instance of a particular part sufficient to…
Expand
Highly Cited
1998
Highly Cited
1998
Product Evolution: A Reverse Engineering and Redesign Methodology
K. Otto
,
K. Wood
1998
Corpus ID: 14371662
Abstract:New products drive business. To remain competitive, industry is continually searching for new methods to evolve their…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE