Email: Password: Remember Me | Create Account (Free)

Back to Subject List

Old thread has been locked -- no new posts accepted in this thread
???
02/15/08 19:10
Modified:
  02/15/08 19:10

Read: times


 
Msg Score: +1
 +1 Informative
#150898 - Reverse Engineering
Responding to: ???'s previous message
A product is reverse engineered by replicating its behavior and not by replicating its content. Reverse engineering has been a major part of my work for the past 40 years. Making a copy is not reverse-engineering. Reverse-engineering, in this context, is based on product behavior, and not on product content.

The one thing that people have to keep in mind, in the context of this "code-stealing" thread, is that cultural attitudes toward ownership of "intellectual property" (in quotes because it is differently defined under different circumstances) vary considerably throughout the world. In the "West" we have a fairly consistent underanding of what intellectual property is and what intellectual property rights are. In the remainder of the world, however, whether the intellectual property is the firmware in an iPod, or whether it's the formula for a life-saving pharmaceutical product, all bets are off as to who is justified in opening/examining/replicating such content.

No form of electronic protection for field-programmable devices has proven to be 100% effective. If a developer chooses to protect his content, be it a CD or a CPLD or a microcontroller, by invoking the on-chip protection for his code, he's saying that the door is locked. Perhaps there's a society within which it is considered appropriate and legal to enter a locked space and examine or remove the contents, and appropriate them for one's own use. I know of no such culture, however.

In cases where, perhaps due to actions of a disgruntled employee, or some other set of circumstances, backup copies of source code and documentation, etc, have been lost, leaving only a programmed and functional product for which someone has already been compensated, the situation is terribly complicated. I have been in situations where I felt I had to retain the sources and source documents to my work "until the check clears."

Cases where source code and documentation are lost within the organization are management problems and only through experience can management be taught that loss of a bit of time during development, time which would be consumed by generating proper documentation and proper backup of every work product, is a price worth paying in order to avoid catastrophic loss of work product when an employee quits, becomes ill, or is lost due to some other unforseeable event.

Laws have been written, which offer rightful owners of intellectual property the right to recover if someone acts illegally to violate the owner's rights to his intellectual property. They all require a reasonable level of effort be expended to protect that property and the exclusive rights to it. I doubt that any court would find in favor a reckless failure to prevent intrusion into a warehouse, resulting in property loss. Likewise, it's reasonable for a prototype to be electronically protected. Given that there will be protected MCU's or other devices on my test bench, I'd want to ensure that, no matter what happens, I have a safe and reliable way to recreate what could be lost or damaged on the test bench, even if the computer used to create the content was lost, stolen, or destroyed.

I'd reiterate, that the responsibility for safe maintenance of documentation and source code is a management issue, and should be handled by them to prevent circumstances within which "extracting" protected code from a programmed MCU would be needed or even just helpful. Sound practices and procedures are the best protection.

For those reasons, I think it's foolhardy for such discussions as have occurred regarding the "cracking" of whatever protections are available for proprietary firmware to occur in this forum.

RE

List of 71 messages in thread
TopicAuthorDate
Security-breaking threads            01/01/70 00:00      
   Mostly bad            01/01/70 00:00      
      put that in the rulse and ...            01/01/70 00:00      
   Reverse Engineering            01/01/70 00:00      
      Why would this be the case?            01/01/70 00:00      
         legal, maybe, but worthless            01/01/70 00:00      
      Reverse Engineering            01/01/70 00:00      
         locked doors            01/01/70 00:00      
            a couple of points ...            01/01/70 00:00      
               Thief?            01/01/70 00:00      
                  Ironically the Chinese Wall            01/01/70 00:00      
                  IANAL, but...            01/01/70 00:00      
                     Are you sure?            01/01/70 00:00      
                  the law can be interpreted in many ways            01/01/70 00:00      
               by the time you'll decide...            01/01/70 00:00      
                  the short happy life of ... Jan Waclawek?            01/01/70 00:00      
                     you apparently don't understand my point, Richard            01/01/70 00:00      
                        It should be how to Protect Your MCU rather then h            01/01/70 00:00      
                        perhaps I do            01/01/70 00:00      
                           Fair use, security, and all that            01/01/70 00:00      
                              It's simpler than that            01/01/70 00:00      
                                 What harm?            01/01/70 00:00      
                                    If you really want to do that            01/01/70 00:00      
                                       A greater harm            01/01/70 00:00      
                                          Have you gone one assumption too far?            01/01/70 00:00      
                                             Republicans, believe .... AIDS            01/01/70 00:00      
                                                mingling the issue            01/01/70 00:00      
                                                   Which link ?            01/01/70 00:00      
                                                      find it yourself            01/01/70 00:00      
                                                         You find it and Its IAR policy not yours            01/01/70 00:00      
                                                            no, it is not, I'm sure            01/01/70 00:00      
                                                               what an IAR in code ...            01/01/70 00:00      
                                                                  not witrh a Keil eval            01/01/70 00:00      
                                                                     Thats company policy            01/01/70 00:00      
                                                                        I sure can make this decision that            01/01/70 00:00      
                                                                           Is leasing Compiler legal ? . I will never do that            01/01/70 00:00      
                                                                              I don't quite understand this..            01/01/70 00:00      
                                                                                 That's why it requires no treatment here            01/01/70 00:00      
                           Would you?            01/01/70 00:00      
   Slap in the face!            01/01/70 00:00      
      Recovering lost code            01/01/70 00:00      
   Don't help pirates but...            01/01/70 00:00      
   FAQ            01/01/70 00:00      
   it sure is immoral to steal code            01/01/70 00:00      
      The morality of repairs.            01/01/70 00:00      
   I've done it legally and ...            01/01/70 00:00      
      Faulty logic            01/01/70 00:00      
         evidently you missed my exception            01/01/70 00:00      
            False statements            01/01/70 00:00      
               GPL as 'protection' LOL            01/01/70 00:00      
      Security through obscurity            01/01/70 00:00      
         other possibilities            01/01/70 00:00      
            Malund you come to conclusion very early !            01/01/70 00:00      
               Are you sure?            01/01/70 00:00      
                  OK, so let's circumvent this problem...            01/01/70 00:00      
               then why have you done so?            01/01/70 00:00      
                  Did that link open your eyes            01/01/70 00:00      
                     I do not care, my code is worthless in hex            01/01/70 00:00      
         This one is on you, Craig ... the buck stops there            01/01/70 00:00      
            Competence.            01/01/70 00:00      
               I know of many 'unteachable'            01/01/70 00:00      
                  That's what put options are for ...            01/01/70 00:00      
                     Let's not promote fakery in the profession            01/01/70 00:00      
   Answer to the original question            01/01/70 00:00      

Back to Subject List