We can use Reverse Engineering for following purposes

:
o It is used to analyze a technology specifically to determine how it was designed or
how it operates.
o Reverse engineering creates a different implementation with the same
functionality for the product.
o It is frequently a key part of the scientific methods and technological
developments.
o It is the process of studying the design principles of system or product as part of
an education in engineering.
o Reverse Engineering is used to understand the data, for example, internal data
structures (i.e. definition of classes of o!ects" record structures, files, lists etc.
o Reverse engineering (RE" is used to understand how a product works more
comprehensively than y only oserving it.
o It is used to know the dataase structure
o It is also used for code restructuring that is accomplished y analyzing the source
code using restructuring tool.
o It is often used for data restructuring.
o #he reverse engineering process allows researchers to understand oth how a
program works and also what aspects of the program contriute to its not working
or its malfunctioning.
o It helps to inspect and correct errors and restrictions and constraints in our
programs
o $or two or more systems or products it is used to make the systems compatile
and synchronized for each other that they could share data and resources to work
together.
o %e can use to evaluating our own product to know and understand its limitations.
o %e can determine whether someone else has literally copied elements of our own
technology and techniques.
o RE is used to transform out of date products into useful ones y adapting them to
new systems, technologies and stages.
o It can also e used to creating documentation for the operation and design of a
product whose maker is unresponsive or out of reach for the customer that is
actually the owner of that product (e.g. software application".
o Reverse engineering gives the asis of reengineering of our product i.e. old user
interfaces those need to e redeveloped.
o If are trying to learn aout some system that could e an operating system in that
case we have to closely analyze the product it functionality, structure and it
consisting files (data" then we could e in a position to produce reverse
engineering.
o If we are allowed to study some companies &eneral 'edger system, we have to
analyze the existing system, its ase line, structure, functions and features etc then
we can e ale to generate reverse engineering. (owever, if we are competitors
of the same farm then they may not allow us to study their system.
o In reverse engineering, researcher gathers the technical data necessary for the
documentation of the operation of a technology.
o In black box reverse engineering, systems are oserved without examining
internal structure, while in white box reverse engineering the inner workings of
the system are inspected.
o Reverse engineering software and researchers are ale to examine the strength of
systems and identify their weaknesses in terms of performance, security, and
interoperaility.
o Independent manufacturers can participate in a competitive market that rewards
the improvements made on leading products. $or example, security audits, which
allow users of software to etter, protect their systems and networks y revealing
security flaws.
#he creation of etter designs and the interoperaility of existing products often egin
with reverse engineering
)aking products and systems compatile so they can work together or share data
*nderstanding how a product works more comprehensively than y merely oserving
it
Investigating and correcting errors and limitations in existing programs.
Reverse engineering is also used by businesses to bring existing physical
geometry into digital product development environments, to make a digital 3D
record of their own products or assess competitors' products.
It is used to analye, for instance, how a product works, what it does, what
components it consists of, estimate costs, identify potential patent
infringement, etc.
Reverse engineering is often used by military in order to copy other nations'
technology, devices or information, or parts of which, have been obtained by
regular troops in the fields or by intelligence operations.
!ther purposes of reverse engineering include security auditing, removal of copy
protection "#cracking#$, circumvention of access restrictions often present in
consumer electronics, customiation of embedded systems "such as engine
management systems$, in%house repairs or retrofits, enabling of additional
features on low%cost #crippled# hardware "such as some graphics card chipsets$,
or even mere satisfaction of curiosity.
Reverse engineering is also used by businesses to bring existing physical
geometry into digital product development environments, to make a digital 3D
record their own products or assess competitors' products. It is used to analye,
for instance, how a product works, what it does, what components it consists of,
estimate costs, identify potential patent infringement, etc.
Reverse engineering is also used to check if some network service may be
exploited via network.
What stages are involved in the reverse engineering process?
Identifying the product or component which will be reverse engineered
In the first stage in the process, sometimes called +prescreening,+ reverse engineers
determine the candidate product for their pro!ect. ,otential candidates for such a pro!ect
include singular items, parts, components, units, suassemlies, some of which may
contain many smaller parts sold as a single entity.
Observing or disassembling the information documenting how the original product
works
#he second stage, disassemly of the original product, is the most time-consuming aspect
of the pro!ect. In this stage, reverse engineers attempt to construct a characterization of
the system y accumulating all of the technical data and instructions of how the product
works.
Implementing the technical data generated by reverse engineering in a replica or
modified version of the original
In the third stage of reverse engineering, reverse engineers try to verify that the data
generated y disassemly is an accurate reconstruction the original system. Engineers
verify the accuracy and validity of their designs y testing the system, creating
prototypes, and experimenting with the results.
Creating a new product and perhaps introducing it into the market.
#he final stage of the reverse engineering process is the introduction of a new product
into the marketplace. #hese new products are often innovations of the original product
with competitive designs, features, or capailities. #hese products may also e
adaptations of the original product for use with other integrated systems, such as different
platforms of computer operating systems.
.ften different groups of engineers perform each step separately, using only documents
to exchange the information learned at each step. #his is to prevent duplication of the
original technology, which may violate copyright. /y contrast, reverse engineering
creates a different implementation with the same functionality.