The fundamentals of barriers to reverse engineering and their implementation into mechanical components
Tóm tắt
Reverse engineering is a common design strategy in industry. It is a term that has come to encompass a large array of engineering and design activities in the literature; however, in its basic form, reverse engineering is simply the process of extracting information about a product from the product itself. Depending on its use, it may or may not be advantageous to utilize a reverse engineering strategy. As with any rational decision, reverse engineering is only favorable when the benefits from its use outweigh the investment. Therefore, a general understanding of the principles that increase the difficulty or investment required to reverse engineer mechanical products would be helpful for everyone affected by reverse engineering activities. In this paper, we articulate and explore these fundamental principles after reviewing examples from the literature and from our own experience. We then use the principles as a basis for the development of a methodology to build barriers to reverse engineering into new products.
Tài liệu tham khảo
Abraham DG, Dolan GM, Double GP, Stevens JV (1991) Transaction security system. IBM Syst J 30(2):206–229
Adams BL, Kalidindi SR, Fullwood DT (2005) Microstructure sensitive design for performance optimization. BYU Academic Publishing, Provo
Ali F, Chowdary B, Imbert C (2008) Part design and evaluation through reverse engineering approach. In: The 2008 IAJC-IJME international conference
Barbero BR (2009) The recovery of design intent in reverse engineering problems. Comput Ind Eng 56(4):1265–1275
Boyne WJ (2009) Carbon copy bomber. Air Force Mag 92(6):52–56
Bradley C, Currie B (2005) Advances in the field of reverse engineering. Comput Aided Des Appl 2(5):697–706
Campbell RJ, Flynn PJ (2001) A survey of free-form object representation and recognition techniques. Comput Vis Image Underst 81:166–210
Christiansen BD (2006) Active FPGA security through decoy circuits. Master’s thesis, Air Force Institute of Technology
Christiansen BD, Kim YC, Bennington RW, Ristich CJ (2006) Decoy circuits for FPGA design protection. In: IEEE international conference on field programmable technology. pp 373–376
Creehan KD, Bidanda B (2006) Rapid prototyping: theory and practice, Springer US, chap reverse engineering: a review & evaluation of non-contact based systems. pp 87–106
Curtis SK, Harston SP, Mattson CA (2009) A generic formulaic characterization of the time to reverse engineer the tolerances of a product. In: ASME IMECE 2009, Lake Buena Vista, Florida, USA, IMECE2009-13123
Dam KW, Lin HS (1996) Cryptography’s role in securing the information society. National Academy Press, Washington, D.C.
Danelek JA (2008) UFOs: the great debate. Llewellyn Publications, Woodbury
Dube TE, Birrer BD, Raines RA, Baldwin RO, Mullins BE, Bennington RW, Reuter CE (2008) Hindering reverse engineering: thinking outside the box. IEEE Secur Priv 6:58–64
Fernandes KJ (2008) Reverse engineering: an industrial perspective, chap 11. Springer, London, pp 207–218
Grand J (2004) Practical secure hardware design for embedded systems. In: Proceedings of the 2004 embedded systems conference
Grimm T (2004) Reverse engineering is criminal. Tech. rep., Time Compression Technologies
Grimm T (2006a) A guide to reverse engineering. Tech. rep., Time Compression Technologies
Grimm T (2006b) Reverse engineering—3D scanning selection guide. Tech. rep., Time Compression Technologies
Harrington HJ (1991) Business process improvement: the breakthrough strategy for total quality, productivity, and competitiveness. McGraw-Hill Professional
Harston SP, Mattson CA (2010a) Capitalizing on heterogeneity and anisotropy to design desirable hardware that is diffcult to reverse engineer. J Mech Des 132:081001
Harston SP, Mattson CA (2010b) Metrics for evaluating the barrier and time to reverse engineer a product. J Mech Des 132:041,009 (p 9)
von Hippel E (1998) Economics of product development by users: the impact of “sticky” local information. Manag Sci 44:629–644
Hsiao SW, Chuang JC (2003) A reverse engineering based approach for product form design. Des Stud 24(2):155–171
Ingle KA (1994) Reverse engineering. McGraw-Hill, New York, NY
James D (2006) Reverse engineering delivers product knowledge, aids technology spread. Tech. Rep. ED Online ID #11966, Electronic Design, http://electronicdesign.com/Articles/ArticleID/11966/11966.html
Knight DC, Mattson CA, Adams BL (2009) Maximizing return on investment by constructing optimal barriers against competitors’ market entry. In: 50th AIAA/ASME/ASCE/AHS/ASC structures, structural dynamics, and materials conference. AIAA, Palm Springs, pp 2009–2224
Li M, Langbein FC, Martin RR (2010) Detecting design intent in approximate cad models using symmetry. Comput Aid Des 42:183–201
Livingston H (2007) Avoiding counterfeit electronic components. IEEE Trans Compon Packag Technol 30:187–189
Macmillan I, McCaffery ML, van Wijk G (1985) Competitors’ responses to easily imitated new products-exploring commercial banking product introductions. Strateg Manag J 6(1):75–86
Maskus KE, Dougherty SM, Mertha A (1998) Intellectual property rights and economic development in China. In: Conference on intellectual property rights and economic development
McEvily AJ (2005) Reverse engineering gone wrong: a case study. Eng Fail Anal 12:834–838
McLoughlin I (2008) Secure embedded systems: the threat of reverse engineering. In: ICPADS ’08: proceedings of the 2008 14th IEEE international conference on parallel and distributed systems. IEEE Computer Society, pp 729–736
Mohaghegh K, Sadeghi MH, Abdullah A (2007) Reverse engineering of turbine blades based on design intent. Int J Adv Manuf Technol 32:1009–1020
Mowery KA, Blanchard DE, Smith S, Betts TA (2004) Investigation of imposter perfumes using GC-MS. J Chem Educ 81:87–89
Musker DC (1998) Reverse engineering. In: Protecting and exploiting intellectual property in electronics, IBC conferences, 10 June 1998
Naumovich G, Memon N (2003) Preventing piracy, reverse engineering, and tampering. IEEE Comput Soc 36:64–71
Nelson ML (1996) A survey of reverse engineering and program comprehension. In: In ODU CS 551—Software Engineering Survey
Norby MO (1978) Soviet aerospace handbook. Department of the US Air Force
Ohly A (2009) Patents and technological progress in a globalized worlda, 6th edn, Springer-Verlag, chap reverse engineering: unfair competition or catalyst for innovation?, pp 535–552
Ohm GS (1827) Die galvanische Kette, mathematisch bearbeitet. T. H. Riemann, Berlin
Otto K, Wood K (2001) Product design. Prentice Hall, Upper Saddle River
Owen CB (2006) Two dimensional friction stir welding model with experimental validation. Master’s thesis, Brigham Young University
Pal DK, Ravi B, Bhargava LS, Chandrasekhar U (2006) Computer-aided reverse engineering for replacement parts: a case study. Def Sci J 56(2):225–238
Pooley J, Graves CT (2008) Trade secrets. Law Journal Press, New York
Raja V (2008) Reverse engineering: an industrial perspective, chap 1. Springer, London, pp 1–9
Reed R, DeFillippi RJ (1990) Casual ambiguity, barriers to imitation, and sustainable competitive advantage. Acad Manag Rev 15:88
Samuelson P, Scotchmer S (2002) The law and economics of reverse engineering. Yale Law J 111(7):1575–1663
Sarkar B, Menq CH (1991) Smooth-surface approximation and reverse engineering. Comput Aided Des 23(9):623–628
Shapiro C (1985) Patent licensing and r & d rivalry. Am Econ Rev 75:25–30
Soo SMK, Yuen EMW, Yu KM (2005) Reverse engineering of a bamboo-net handicraft. In: IEEE ninth international conference on computer aided design and computer graphics
Stamati V, Fudos I (2007) A feature based approach to re-engineering objects of freeform design by exploiting point cloud morphology. In: Proceedings of the 2007 ACM symposium on solid and physical modeling, vol 2. pp 1–9
Summers JD, Shah JJ (2010) Mechanical engineering design complexity metrics: size, coupling, and solvability. J Mech Des 132:021,004 (p 11)
Suvorov V (1981) The liberators: inside the Soviet army. New English Library, London
Thompson WB, Owen JC, de St Germain HJ, Stark SR, Henderson TC (1999) Feature-based reverse engineering of mechanical parts. IEEE Trans Robot Autom 15(1):57–66
de Toledo R, Levy B, Paul JC (2008) Reverse engineering for industrial-plant cad models. In: Tools and methods for competitive engineering, Izmir, Turkey. pp 1021–1034
Ulrich KT, Eppinger SD (2004) Product design and development, 3rd edn. McGraw-Hill/Irwin, Boston
Urbanic RJ, ElMaraghy WH (2009) Using a modified failure modes and effects analysis within the structured design recovery framework. J Mech Des 131:111,005 (13 pages)
USAF (1944) Boeing b-29. http://www.nationalmuseum.af.mil/factsheets/factsheet.asp?id=2527
Várady T (2001) Reverse engineering shapes. ERCIM News 44:19–20
Várady T, Facello MA (2005) New trends in digital shape reconstruction. Math Surf XI 3604:395–412
Várady T, Martin RR, Cox J (1997) Reverse engineering of geometric models: an introduction. Comput Aided Des 29:255–268
Várady T, Facello MA, Terék Z (2007) Automatic extraction of surface structures in digital shape reconstruction. Comput Aided Des 39:379–388
Weingart SH, White SR, Arnold WC, Double GP (1990) An evaluation system for the physical security of computing systems. In: The sixth annual computer security applications conference. pp 232–243