The fundamentals of barriers to reverse engineering and their implementation into mechanical components

Research in Engineering Design - Tập 22 - Trang 245-261 - 2011
Shane K. Curtis1, Stephen P. Harston1, Christopher A. Mattson1
1Department of Mechanical Engineering, Brigham Young University, Provo, USA

Tóm tắt

Reverse engineering is a common design strategy in industry. It is a term that has come to encompass a large array of engineering and design activities in the literature; however, in its basic form, reverse engineering is simply the process of extracting information about a product from the product itself. Depending on its use, it may or may not be advantageous to utilize a reverse engineering strategy. As with any rational decision, reverse engineering is only favorable when the benefits from its use outweigh the investment. Therefore, a general understanding of the principles that increase the difficulty or investment required to reverse engineer mechanical products would be helpful for everyone affected by reverse engineering activities. In this paper, we articulate and explore these fundamental principles after reviewing examples from the literature and from our own experience. We then use the principles as a basis for the development of a methodology to build barriers to reverse engineering into new products.

Tài liệu tham khảo

Abraham DG, Dolan GM, Double GP, Stevens JV (1991) Transaction security system. IBM Syst J 30(2):206–229 Adams BL, Kalidindi SR, Fullwood DT (2005) Microstructure sensitive design for performance optimization. BYU Academic Publishing, Provo Ali F, Chowdary B, Imbert C (2008) Part design and evaluation through reverse engineering approach. In: The 2008 IAJC-IJME international conference Barbero BR (2009) The recovery of design intent in reverse engineering problems. Comput Ind Eng 56(4):1265–1275 Boyne WJ (2009) Carbon copy bomber. Air Force Mag 92(6):52–56 Bradley C, Currie B (2005) Advances in the field of reverse engineering. Comput Aided Des Appl 2(5):697–706 Campbell RJ, Flynn PJ (2001) A survey of free-form object representation and recognition techniques. Comput Vis Image Underst 81:166–210 Christiansen BD (2006) Active FPGA security through decoy circuits. Master’s thesis, Air Force Institute of Technology Christiansen BD, Kim YC, Bennington RW, Ristich CJ (2006) Decoy circuits for FPGA design protection. In: IEEE international conference on field programmable technology. pp 373–376 Creehan KD, Bidanda B (2006) Rapid prototyping: theory and practice, Springer US, chap reverse engineering: a review & evaluation of non-contact based systems. pp 87–106 Curtis SK, Harston SP, Mattson CA (2009) A generic formulaic characterization of the time to reverse engineer the tolerances of a product. In: ASME IMECE 2009, Lake Buena Vista, Florida, USA, IMECE2009-13123 Dam KW, Lin HS (1996) Cryptography’s role in securing the information society. National Academy Press, Washington, D.C. Danelek JA (2008) UFOs: the great debate. Llewellyn Publications, Woodbury Dube TE, Birrer BD, Raines RA, Baldwin RO, Mullins BE, Bennington RW, Reuter CE (2008) Hindering reverse engineering: thinking outside the box. IEEE Secur Priv 6:58–64 Fernandes KJ (2008) Reverse engineering: an industrial perspective, chap 11. Springer, London, pp 207–218 Grand J (2004) Practical secure hardware design for embedded systems. In: Proceedings of the 2004 embedded systems conference Grimm T (2004) Reverse engineering is criminal. Tech. rep., Time Compression Technologies Grimm T (2006a) A guide to reverse engineering. Tech. rep., Time Compression Technologies Grimm T (2006b) Reverse engineering—3D scanning selection guide. Tech. rep., Time Compression Technologies Harrington HJ (1991) Business process improvement: the breakthrough strategy for total quality, productivity, and competitiveness. McGraw-Hill Professional Harston SP, Mattson CA (2010a) Capitalizing on heterogeneity and anisotropy to design desirable hardware that is diffcult to reverse engineer. J Mech Des 132:081001 Harston SP, Mattson CA (2010b) Metrics for evaluating the barrier and time to reverse engineer a product. J Mech Des 132:041,009 (p 9) von Hippel E (1998) Economics of product development by users: the impact of “sticky” local information. Manag Sci 44:629–644 Hsiao SW, Chuang JC (2003) A reverse engineering based approach for product form design. Des Stud 24(2):155–171 Ingle KA (1994) Reverse engineering. McGraw-Hill, New York, NY James D (2006) Reverse engineering delivers product knowledge, aids technology spread. Tech. Rep. ED Online ID #11966, Electronic Design, http://electronicdesign.com/Articles/ArticleID/11966/11966.html Knight DC, Mattson CA, Adams BL (2009) Maximizing return on investment by constructing optimal barriers against competitors’ market entry. In: 50th AIAA/ASME/ASCE/AHS/ASC structures, structural dynamics, and materials conference. AIAA, Palm Springs, pp 2009–2224 Li M, Langbein FC, Martin RR (2010) Detecting design intent in approximate cad models using symmetry. Comput Aid Des 42:183–201 Livingston H (2007) Avoiding counterfeit electronic components. IEEE Trans Compon Packag Technol 30:187–189 Macmillan I, McCaffery ML, van Wijk G (1985) Competitors’ responses to easily imitated new products-exploring commercial banking product introductions. Strateg Manag J 6(1):75–86 Maskus KE, Dougherty SM, Mertha A (1998) Intellectual property rights and economic development in China. In: Conference on intellectual property rights and economic development McEvily AJ (2005) Reverse engineering gone wrong: a case study. Eng Fail Anal 12:834–838 McLoughlin I (2008) Secure embedded systems: the threat of reverse engineering. In: ICPADS ’08: proceedings of the 2008 14th IEEE international conference on parallel and distributed systems. IEEE Computer Society, pp 729–736 Mohaghegh K, Sadeghi MH, Abdullah A (2007) Reverse engineering of turbine blades based on design intent. Int J Adv Manuf Technol 32:1009–1020 Mowery KA, Blanchard DE, Smith S, Betts TA (2004) Investigation of imposter perfumes using GC-MS. J Chem Educ 81:87–89 Musker DC (1998) Reverse engineering. In: Protecting and exploiting intellectual property in electronics, IBC conferences, 10 June 1998 Naumovich G, Memon N (2003) Preventing piracy, reverse engineering, and tampering. IEEE Comput Soc 36:64–71 Nelson ML (1996) A survey of reverse engineering and program comprehension. In: In ODU CS 551—Software Engineering Survey Norby MO (1978) Soviet aerospace handbook. Department of the US Air Force Ohly A (2009) Patents and technological progress in a globalized worlda, 6th edn, Springer-Verlag, chap reverse engineering: unfair competition or catalyst for innovation?, pp 535–552 Ohm GS (1827) Die galvanische Kette, mathematisch bearbeitet. T. H. Riemann, Berlin Otto K, Wood K (2001) Product design. Prentice Hall, Upper Saddle River Owen CB (2006) Two dimensional friction stir welding model with experimental validation. Master’s thesis, Brigham Young University Pal DK, Ravi B, Bhargava LS, Chandrasekhar U (2006) Computer-aided reverse engineering for replacement parts: a case study. Def Sci J 56(2):225–238 Pooley J, Graves CT (2008) Trade secrets. Law Journal Press, New York Raja V (2008) Reverse engineering: an industrial perspective, chap 1. Springer, London, pp 1–9 Reed R, DeFillippi RJ (1990) Casual ambiguity, barriers to imitation, and sustainable competitive advantage. Acad Manag Rev 15:88 Samuelson P, Scotchmer S (2002) The law and economics of reverse engineering. Yale Law J 111(7):1575–1663 Sarkar B, Menq CH (1991) Smooth-surface approximation and reverse engineering. Comput Aided Des 23(9):623–628 Shapiro C (1985) Patent licensing and r & d rivalry. Am Econ Rev 75:25–30 Soo SMK, Yuen EMW, Yu KM (2005) Reverse engineering of a bamboo-net handicraft. In: IEEE ninth international conference on computer aided design and computer graphics Stamati V, Fudos I (2007) A feature based approach to re-engineering objects of freeform design by exploiting point cloud morphology. In: Proceedings of the 2007 ACM symposium on solid and physical modeling, vol 2. pp 1–9 Summers JD, Shah JJ (2010) Mechanical engineering design complexity metrics: size, coupling, and solvability. J Mech Des 132:021,004 (p 11) Suvorov V (1981) The liberators: inside the Soviet army. New English Library, London Thompson WB, Owen JC, de St Germain HJ, Stark SR, Henderson TC (1999) Feature-based reverse engineering of mechanical parts. IEEE Trans Robot Autom 15(1):57–66 de Toledo R, Levy B, Paul JC (2008) Reverse engineering for industrial-plant cad models. In: Tools and methods for competitive engineering, Izmir, Turkey. pp 1021–1034 Ulrich KT, Eppinger SD (2004) Product design and development, 3rd edn. McGraw-Hill/Irwin, Boston Urbanic RJ, ElMaraghy WH (2009) Using a modified failure modes and effects analysis within the structured design recovery framework. J Mech Des 131:111,005 (13 pages) USAF (1944) Boeing b-29. http://www.nationalmuseum.af.mil/factsheets/factsheet.asp?id=2527 Várady T (2001) Reverse engineering shapes. ERCIM News 44:19–20 Várady T, Facello MA (2005) New trends in digital shape reconstruction. Math Surf XI 3604:395–412 Várady T, Martin RR, Cox J (1997) Reverse engineering of geometric models: an introduction. Comput Aided Des 29:255–268 Várady T, Facello MA, Terék Z (2007) Automatic extraction of surface structures in digital shape reconstruction. Comput Aided Des 39:379–388 Weingart SH, White SR, Arnold WC, Double GP (1990) An evaluation system for the physical security of computing systems. In: The sixth annual computer security applications conference. pp 232–243