Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home IT Management
    • IT Management

    What Is Reverse Engineering?

    Written by

    Jim Rapoza
    Published September 5, 2005
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Heres a little test. Go to Google and type the search phrase define: reverse engineering. Youll be given a list of definitions, some of which are short and concise and some of which are long, rambling and esoteric. But, basically, these results split into two mind-sets.

      The first mind-set is probably best represented by the definition currently provided by Wikipedia: “Reverse engineering (RE) is the process of taking something (a device, an electrical component, a software program, etc.) apart and analyzing its workings in detail, usually with the intention to construct a new device or program that does the same thing without actually copying anything from the original.”

      The second mind-set is most concisely summarized by the reverse-engineering definition from the Canadian Geospatial Data Infrastructure: “Analyzing a product or other output of a process in order to determine how to duplicate the know-how which has been used to create a product or process.”

      You might think this is just an exercise in semantics. After all, most terms have multiple, sometimes even conflicting, definitions. Does it really matter exactly how reverse engineering is defined?

      Yes, it does. In fact, it matters a whole lot. In this world of out-of-control patents, tight intellectual property controls and— most important—slippery software EULAs (end-user license agreements), the definition of reverse engineering will have a big impact on how developers can integrate with products and systems to build innovative new applications.

      Developers and security researchers recently have had their work shut down or curtailed because a court found they had violated the no-reverse-engineering clauses so commonly found in EULAs.

      Anyone who reads this column knows that I would prefer it if EULAs had no weight in court cases at all.

      But if courts are going to take EULAs seriously, then we need to make sure that they use a definition of reverse engineering that will not put up hurdles to innovation.

      /zimages/5/28571.gifTo read more about Jim Rapozas issues with EULAs, click here.

      Id like to see Wikipedias recent take become the de facto definition of reverse engineering and the one that courts would use in trying cases. The Wikipedia definition clearly states that reverse engineering involves digging deep into the code of an application—most likely by decompiling it and copying much of the functionality of it, and doing so most likely to copy and compete with the original application.

      This is clearly the sleaziest and most damaging form of reverse engineering. Its one that doesnt involve innovation—or, at least, not any positive form of innovation.

      If this were the definition that courts used when covering potential EULA infractions and other violations, software companies rights would be protected. But so, too, would innovation.

      Its when the courts use the definition of reverse engineering espoused by the CGDI and others that we put innovation at risk. And its no coincidence that this definition is used most often.

      By this definition, reverse engineering occurs when a user simply looks at an application and analyzes how it works, how it connects to other programs and processes, and how the other programs and processes connect to it. No code penetration is involved, no decompiling. And, usually, the goal isnt to copy an application but to integrate with it or look for potential problems in it.

      By this definition, we reverse-engineer the Web every day, and enterprise software companies reverse-engineer a whole score of data center systems.

      The problem is that this is the definition that software companies use to stop competition and cover their turf.

      A security researcher notices that your application has a network port open that leaves it insecure? No problem: Accuse him or her of reverse engineering and violating a EULA.

      A clever user has come up with a program that extends your system, and youre mad because you didnt think of it and want to do the same thing to get more cash from your users? Go get that reverse-engineering criminal!

      From now on, lets all make a pact: Whenever you use the term “reverse engineering,” make sure its in reference to the sleazy code-copying form of the practice and not to integration, analysis or just plain smart development.

      Labs Director Jim Rapoza can be reached at jim_rapoza@ziffdavis.com.

      /zimages/5/28571.gifReaders respond to “What Is Reverse Engineering?” Click here to read more.

      /zimages/5/28571.gifCheck out eWEEK.coms for the latest news, reviews and analysis on IT management from CIOInsight.com.

      To read more Jim Rapoza, subscribe to eWEEK magazine.

      Jim Rapoza
      Jim Rapoza
      Jim Rapoza, Chief Technology Analyst, eWEEK.For nearly fifteen years, Jim Rapoza has evaluated products and technologies in almost every technology category for eWEEK. Mr Rapoza's current technology focus is on all categories of emerging information technology though he continues to focus on core technology areas that include: content management systems, portal applications, Web publishing tools and security. Mr. Rapoza has coordinated several evaluations at enterprise organizations, including USA Today and The Prudential, to measure the capability of products and services under real-world conditions and against real-world criteria. Jim Rapoza's award-winning weekly column, Tech Directions, delves into all areas of technologies and the challenges of managing and deploying technology today.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×