Skip to main content
Erschienen in: Research in Engineering Design 4/2011

01.10.2011 | Original Paper

The fundamentals of barriers to reverse engineering and their implementation into mechanical components

verfasst von: Shane K. Curtis, Stephen P. Harston, Christopher A. Mattson

Erschienen in: Research in Engineering Design | Ausgabe 4/2011

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Reverse engineering is a common design strategy in industry. It is a term that has come to encompass a large array of engineering and design activities in the literature; however, in its basic form, reverse engineering is simply the process of extracting information about a product from the product itself. Depending on its use, it may or may not be advantageous to utilize a reverse engineering strategy. As with any rational decision, reverse engineering is only favorable when the benefits from its use outweigh the investment. Therefore, a general understanding of the principles that increase the difficulty or investment required to reverse engineer mechanical products would be helpful for everyone affected by reverse engineering activities. In this paper, we articulate and explore these fundamental principles after reviewing examples from the literature and from our own experience. We then use the principles as a basis for the development of a methodology to build barriers to reverse engineering into new products.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abraham DG, Dolan GM, Double GP, Stevens JV (1991) Transaction security system. IBM Syst J 30(2):206–229CrossRef Abraham DG, Dolan GM, Double GP, Stevens JV (1991) Transaction security system. IBM Syst J 30(2):206–229CrossRef
Zurück zum Zitat Adams BL, Kalidindi SR, Fullwood DT (2005) Microstructure sensitive design for performance optimization. BYU Academic Publishing, Provo Adams BL, Kalidindi SR, Fullwood DT (2005) Microstructure sensitive design for performance optimization. BYU Academic Publishing, Provo
Zurück zum Zitat Ali F, Chowdary B, Imbert C (2008) Part design and evaluation through reverse engineering approach. In: The 2008 IAJC-IJME international conference Ali F, Chowdary B, Imbert C (2008) Part design and evaluation through reverse engineering approach. In: The 2008 IAJC-IJME international conference
Zurück zum Zitat Barbero BR (2009) The recovery of design intent in reverse engineering problems. Comput Ind Eng 56(4):1265–1275CrossRef Barbero BR (2009) The recovery of design intent in reverse engineering problems. Comput Ind Eng 56(4):1265–1275CrossRef
Zurück zum Zitat Boyne WJ (2009) Carbon copy bomber. Air Force Mag 92(6):52–56 Boyne WJ (2009) Carbon copy bomber. Air Force Mag 92(6):52–56
Zurück zum Zitat Bradley C, Currie B (2005) Advances in the field of reverse engineering. Comput Aided Des Appl 2(5):697–706 Bradley C, Currie B (2005) Advances in the field of reverse engineering. Comput Aided Des Appl 2(5):697–706
Zurück zum Zitat Campbell RJ, Flynn PJ (2001) A survey of free-form object representation and recognition techniques. Comput Vis Image Underst 81:166–210MATHCrossRef Campbell RJ, Flynn PJ (2001) A survey of free-form object representation and recognition techniques. Comput Vis Image Underst 81:166–210MATHCrossRef
Zurück zum Zitat Christiansen BD (2006) Active FPGA security through decoy circuits. Master’s thesis, Air Force Institute of Technology Christiansen BD (2006) Active FPGA security through decoy circuits. Master’s thesis, Air Force Institute of Technology
Zurück zum Zitat Christiansen BD, Kim YC, Bennington RW, Ristich CJ (2006) Decoy circuits for FPGA design protection. In: IEEE international conference on field programmable technology. pp 373–376 Christiansen BD, Kim YC, Bennington RW, Ristich CJ (2006) Decoy circuits for FPGA design protection. In: IEEE international conference on field programmable technology. pp 373–376
Zurück zum Zitat Creehan KD, Bidanda B (2006) Rapid prototyping: theory and practice, Springer US, chap reverse engineering: a review & evaluation of non-contact based systems. pp 87–106 Creehan KD, Bidanda B (2006) Rapid prototyping: theory and practice, Springer US, chap reverse engineering: a review & evaluation of non-contact based systems. pp 87–106
Zurück zum Zitat Curtis SK, Harston SP, Mattson CA (2009) A generic formulaic characterization of the time to reverse engineer the tolerances of a product. In: ASME IMECE 2009, Lake Buena Vista, Florida, USA, IMECE2009-13123 Curtis SK, Harston SP, Mattson CA (2009) A generic formulaic characterization of the time to reverse engineer the tolerances of a product. In: ASME IMECE 2009, Lake Buena Vista, Florida, USA, IMECE2009-13123
Zurück zum Zitat Dam KW, Lin HS (1996) Cryptography’s role in securing the information society. National Academy Press, Washington, D.C. Dam KW, Lin HS (1996) Cryptography’s role in securing the information society. National Academy Press, Washington, D.C.
Zurück zum Zitat Danelek JA (2008) UFOs: the great debate. Llewellyn Publications, Woodbury Danelek JA (2008) UFOs: the great debate. Llewellyn Publications, Woodbury
Zurück zum Zitat Dube TE, Birrer BD, Raines RA, Baldwin RO, Mullins BE, Bennington RW, Reuter CE (2008) Hindering reverse engineering: thinking outside the box. IEEE Secur Priv 6:58–64CrossRef Dube TE, Birrer BD, Raines RA, Baldwin RO, Mullins BE, Bennington RW, Reuter CE (2008) Hindering reverse engineering: thinking outside the box. IEEE Secur Priv 6:58–64CrossRef
Zurück zum Zitat Fernandes KJ (2008) Reverse engineering: an industrial perspective, chap 11. Springer, London, pp 207–218 Fernandes KJ (2008) Reverse engineering: an industrial perspective, chap 11. Springer, London, pp 207–218
Zurück zum Zitat Grand J (2004) Practical secure hardware design for embedded systems. In: Proceedings of the 2004 embedded systems conference Grand J (2004) Practical secure hardware design for embedded systems. In: Proceedings of the 2004 embedded systems conference
Zurück zum Zitat Grimm T (2004) Reverse engineering is criminal. Tech. rep., Time Compression Technologies Grimm T (2004) Reverse engineering is criminal. Tech. rep., Time Compression Technologies
Zurück zum Zitat Grimm T (2006a) A guide to reverse engineering. Tech. rep., Time Compression Technologies Grimm T (2006a) A guide to reverse engineering. Tech. rep., Time Compression Technologies
Zurück zum Zitat Grimm T (2006b) Reverse engineering—3D scanning selection guide. Tech. rep., Time Compression Technologies Grimm T (2006b) Reverse engineering—3D scanning selection guide. Tech. rep., Time Compression Technologies
Zurück zum Zitat Harrington HJ (1991) Business process improvement: the breakthrough strategy for total quality, productivity, and competitiveness. McGraw-Hill Professional Harrington HJ (1991) Business process improvement: the breakthrough strategy for total quality, productivity, and competitiveness. McGraw-Hill Professional
Zurück zum Zitat Harston SP, Mattson CA (2010a) Capitalizing on heterogeneity and anisotropy to design desirable hardware that is diffcult to reverse engineer. J Mech Des 132:081001 Harston SP, Mattson CA (2010a) Capitalizing on heterogeneity and anisotropy to design desirable hardware that is diffcult to reverse engineer. J Mech Des 132:081001
Zurück zum Zitat Harston SP, Mattson CA (2010b) Metrics for evaluating the barrier and time to reverse engineer a product. J Mech Des 132:041,009 (p 9) Harston SP, Mattson CA (2010b) Metrics for evaluating the barrier and time to reverse engineer a product. J Mech Des 132:041,009 (p 9)
Zurück zum Zitat von Hippel E (1998) Economics of product development by users: the impact of “sticky” local information. Manag Sci 44:629–644MATHCrossRef von Hippel E (1998) Economics of product development by users: the impact of “sticky” local information. Manag Sci 44:629–644MATHCrossRef
Zurück zum Zitat Hsiao SW, Chuang JC (2003) A reverse engineering based approach for product form design. Des Stud 24(2):155–171CrossRef Hsiao SW, Chuang JC (2003) A reverse engineering based approach for product form design. Des Stud 24(2):155–171CrossRef
Zurück zum Zitat Ingle KA (1994) Reverse engineering. McGraw-Hill, New York, NY Ingle KA (1994) Reverse engineering. McGraw-Hill, New York, NY
Zurück zum Zitat Knight DC, Mattson CA, Adams BL (2009) Maximizing return on investment by constructing optimal barriers against competitors’ market entry. In: 50th AIAA/ASME/ASCE/AHS/ASC structures, structural dynamics, and materials conference. AIAA, Palm Springs, pp 2009–2224 Knight DC, Mattson CA, Adams BL (2009) Maximizing return on investment by constructing optimal barriers against competitors’ market entry. In: 50th AIAA/ASME/ASCE/AHS/ASC structures, structural dynamics, and materials conference. AIAA, Palm Springs, pp 2009–2224
Zurück zum Zitat Li M, Langbein FC, Martin RR (2010) Detecting design intent in approximate cad models using symmetry. Comput Aid Des 42:183–201CrossRef Li M, Langbein FC, Martin RR (2010) Detecting design intent in approximate cad models using symmetry. Comput Aid Des 42:183–201CrossRef
Zurück zum Zitat Livingston H (2007) Avoiding counterfeit electronic components. IEEE Trans Compon Packag Technol 30:187–189CrossRef Livingston H (2007) Avoiding counterfeit electronic components. IEEE Trans Compon Packag Technol 30:187–189CrossRef
Zurück zum Zitat Macmillan I, McCaffery ML, van Wijk G (1985) Competitors’ responses to easily imitated new products-exploring commercial banking product introductions. Strateg Manag J 6(1):75–86CrossRef Macmillan I, McCaffery ML, van Wijk G (1985) Competitors’ responses to easily imitated new products-exploring commercial banking product introductions. Strateg Manag J 6(1):75–86CrossRef
Zurück zum Zitat Maskus KE, Dougherty SM, Mertha A (1998) Intellectual property rights and economic development in China. In: Conference on intellectual property rights and economic development Maskus KE, Dougherty SM, Mertha A (1998) Intellectual property rights and economic development in China. In: Conference on intellectual property rights and economic development
Zurück zum Zitat McEvily AJ (2005) Reverse engineering gone wrong: a case study. Eng Fail Anal 12:834–838CrossRef McEvily AJ (2005) Reverse engineering gone wrong: a case study. Eng Fail Anal 12:834–838CrossRef
Zurück zum Zitat McLoughlin I (2008) Secure embedded systems: the threat of reverse engineering. In: ICPADS ’08: proceedings of the 2008 14th IEEE international conference on parallel and distributed systems. IEEE Computer Society, pp 729–736 McLoughlin I (2008) Secure embedded systems: the threat of reverse engineering. In: ICPADS ’08: proceedings of the 2008 14th IEEE international conference on parallel and distributed systems. IEEE Computer Society, pp 729–736
Zurück zum Zitat Mohaghegh K, Sadeghi MH, Abdullah A (2007) Reverse engineering of turbine blades based on design intent. Int J Adv Manuf Technol 32:1009–1020CrossRef Mohaghegh K, Sadeghi MH, Abdullah A (2007) Reverse engineering of turbine blades based on design intent. Int J Adv Manuf Technol 32:1009–1020CrossRef
Zurück zum Zitat Mowery KA, Blanchard DE, Smith S, Betts TA (2004) Investigation of imposter perfumes using GC-MS. J Chem Educ 81:87–89CrossRef Mowery KA, Blanchard DE, Smith S, Betts TA (2004) Investigation of imposter perfumes using GC-MS. J Chem Educ 81:87–89CrossRef
Zurück zum Zitat Musker DC (1998) Reverse engineering. In: Protecting and exploiting intellectual property in electronics, IBC conferences, 10 June 1998 Musker DC (1998) Reverse engineering. In: Protecting and exploiting intellectual property in electronics, IBC conferences, 10 June 1998
Zurück zum Zitat Naumovich G, Memon N (2003) Preventing piracy, reverse engineering, and tampering. IEEE Comput Soc 36:64–71 Naumovich G, Memon N (2003) Preventing piracy, reverse engineering, and tampering. IEEE Comput Soc 36:64–71
Zurück zum Zitat Nelson ML (1996) A survey of reverse engineering and program comprehension. In: In ODU CS 551—Software Engineering Survey Nelson ML (1996) A survey of reverse engineering and program comprehension. In: In ODU CS 551—Software Engineering Survey
Zurück zum Zitat Norby MO (1978) Soviet aerospace handbook. Department of the US Air Force Norby MO (1978) Soviet aerospace handbook. Department of the US Air Force
Zurück zum Zitat Ohly A (2009) Patents and technological progress in a globalized worlda, 6th edn, Springer-Verlag, chap reverse engineering: unfair competition or catalyst for innovation?, pp 535–552 Ohly A (2009) Patents and technological progress in a globalized worlda, 6th edn, Springer-Verlag, chap reverse engineering: unfair competition or catalyst for innovation?, pp 535–552
Zurück zum Zitat Ohm GS (1827) Die galvanische Kette, mathematisch bearbeitet. T. H. Riemann, Berlin Ohm GS (1827) Die galvanische Kette, mathematisch bearbeitet. T. H. Riemann, Berlin
Zurück zum Zitat Otto K, Wood K (2001) Product design. Prentice Hall, Upper Saddle River Otto K, Wood K (2001) Product design. Prentice Hall, Upper Saddle River
Zurück zum Zitat Owen CB (2006) Two dimensional friction stir welding model with experimental validation. Master’s thesis, Brigham Young University Owen CB (2006) Two dimensional friction stir welding model with experimental validation. Master’s thesis, Brigham Young University
Zurück zum Zitat Pal DK, Ravi B, Bhargava LS, Chandrasekhar U (2006) Computer-aided reverse engineering for replacement parts: a case study. Def Sci J 56(2):225–238 Pal DK, Ravi B, Bhargava LS, Chandrasekhar U (2006) Computer-aided reverse engineering for replacement parts: a case study. Def Sci J 56(2):225–238
Zurück zum Zitat Pooley J, Graves CT (2008) Trade secrets. Law Journal Press, New York Pooley J, Graves CT (2008) Trade secrets. Law Journal Press, New York
Zurück zum Zitat Raja V (2008) Reverse engineering: an industrial perspective, chap 1. Springer, London, pp 1–9 Raja V (2008) Reverse engineering: an industrial perspective, chap 1. Springer, London, pp 1–9
Zurück zum Zitat Reed R, DeFillippi RJ (1990) Casual ambiguity, barriers to imitation, and sustainable competitive advantage. Acad Manag Rev 15:88 Reed R, DeFillippi RJ (1990) Casual ambiguity, barriers to imitation, and sustainable competitive advantage. Acad Manag Rev 15:88
Zurück zum Zitat Samuelson P, Scotchmer S (2002) The law and economics of reverse engineering. Yale Law J 111(7):1575–1663CrossRef Samuelson P, Scotchmer S (2002) The law and economics of reverse engineering. Yale Law J 111(7):1575–1663CrossRef
Zurück zum Zitat Sarkar B, Menq CH (1991) Smooth-surface approximation and reverse engineering. Comput Aided Des 23(9):623–628MATHCrossRef Sarkar B, Menq CH (1991) Smooth-surface approximation and reverse engineering. Comput Aided Des 23(9):623–628MATHCrossRef
Zurück zum Zitat Shapiro C (1985) Patent licensing and r & d rivalry. Am Econ Rev 75:25–30 Shapiro C (1985) Patent licensing and r & d rivalry. Am Econ Rev 75:25–30
Zurück zum Zitat Soo SMK, Yuen EMW, Yu KM (2005) Reverse engineering of a bamboo-net handicraft. In: IEEE ninth international conference on computer aided design and computer graphics Soo SMK, Yuen EMW, Yu KM (2005) Reverse engineering of a bamboo-net handicraft. In: IEEE ninth international conference on computer aided design and computer graphics
Zurück zum Zitat Stamati V, Fudos I (2007) A feature based approach to re-engineering objects of freeform design by exploiting point cloud morphology. In: Proceedings of the 2007 ACM symposium on solid and physical modeling, vol 2. pp 1–9 Stamati V, Fudos I (2007) A feature based approach to re-engineering objects of freeform design by exploiting point cloud morphology. In: Proceedings of the 2007 ACM symposium on solid and physical modeling, vol 2. pp 1–9
Zurück zum Zitat Summers JD, Shah JJ (2010) Mechanical engineering design complexity metrics: size, coupling, and solvability. J Mech Des 132:021,004 (p 11) Summers JD, Shah JJ (2010) Mechanical engineering design complexity metrics: size, coupling, and solvability. J Mech Des 132:021,004 (p 11)
Zurück zum Zitat Suvorov V (1981) The liberators: inside the Soviet army. New English Library, London Suvorov V (1981) The liberators: inside the Soviet army. New English Library, London
Zurück zum Zitat Thompson WB, Owen JC, de St Germain HJ, Stark SR, Henderson TC (1999) Feature-based reverse engineering of mechanical parts. IEEE Trans Robot Autom 15(1):57–66CrossRef Thompson WB, Owen JC, de St Germain HJ, Stark SR, Henderson TC (1999) Feature-based reverse engineering of mechanical parts. IEEE Trans Robot Autom 15(1):57–66CrossRef
Zurück zum Zitat de Toledo R, Levy B, Paul JC (2008) Reverse engineering for industrial-plant cad models. In: Tools and methods for competitive engineering, Izmir, Turkey. pp 1021–1034 de Toledo R, Levy B, Paul JC (2008) Reverse engineering for industrial-plant cad models. In: Tools and methods for competitive engineering, Izmir, Turkey. pp 1021–1034
Zurück zum Zitat Ulrich KT, Eppinger SD (2004) Product design and development, 3rd edn. McGraw-Hill/Irwin, Boston Ulrich KT, Eppinger SD (2004) Product design and development, 3rd edn. McGraw-Hill/Irwin, Boston
Zurück zum Zitat Urbanic RJ, ElMaraghy WH (2009) Using a modified failure modes and effects analysis within the structured design recovery framework. J Mech Des 131:111,005 (13 pages) Urbanic RJ, ElMaraghy WH (2009) Using a modified failure modes and effects analysis within the structured design recovery framework. J Mech Des 131:111,005 (13 pages)
Zurück zum Zitat Várady T (2001) Reverse engineering shapes. ERCIM News 44:19–20 Várady T (2001) Reverse engineering shapes. ERCIM News 44:19–20
Zurück zum Zitat Várady T, Facello MA (2005) New trends in digital shape reconstruction. Math Surf XI 3604:395–412CrossRef Várady T, Facello MA (2005) New trends in digital shape reconstruction. Math Surf XI 3604:395–412CrossRef
Zurück zum Zitat Várady T, Martin RR, Cox J (1997) Reverse engineering of geometric models: an introduction. Comput Aided Des 29:255–268CrossRef Várady T, Martin RR, Cox J (1997) Reverse engineering of geometric models: an introduction. Comput Aided Des 29:255–268CrossRef
Zurück zum Zitat Várady T, Facello MA, Terék Z (2007) Automatic extraction of surface structures in digital shape reconstruction. Comput Aided Des 39:379–388CrossRef Várady T, Facello MA, Terék Z (2007) Automatic extraction of surface structures in digital shape reconstruction. Comput Aided Des 39:379–388CrossRef
Zurück zum Zitat Weingart SH, White SR, Arnold WC, Double GP (1990) An evaluation system for the physical security of computing systems. In: The sixth annual computer security applications conference. pp 232–243 Weingart SH, White SR, Arnold WC, Double GP (1990) An evaluation system for the physical security of computing systems. In: The sixth annual computer security applications conference. pp 232–243
Metadaten
Titel
The fundamentals of barriers to reverse engineering and their implementation into mechanical components
verfasst von
Shane K. Curtis
Stephen P. Harston
Christopher A. Mattson
Publikationsdatum
01.10.2011
Verlag
Springer-Verlag
Erschienen in
Research in Engineering Design / Ausgabe 4/2011
Print ISSN: 0934-9839
Elektronische ISSN: 1435-6066
DOI
https://doi.org/10.1007/s00163-011-0109-6

Weitere Artikel der Ausgabe 4/2011

Research in Engineering Design 4/2011 Zur Ausgabe

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.