计算机科学 ›› 2014, Vol. 41 ›› Issue (11): 12-15.doi: 10.11896/j.issn.1002-137X.2014.11.003

• 综述 • 上一篇    下一篇

针对网络编码的逆向工程技术合法性分析

杜行舟,徐超,孟昭鹏   

  1. 天津大学国家示范性软件学院 天津300072;天津大学国家示范性软件学院 天津300072;天津大学国家示范性软件学院 天津300072
  • 出版日期:2018-11-14 发布日期:2018-11-14

Legitimacy Analysis of Reverse Engineering Technique towards Network Coding

DU Xing-zhou,XU Chao and MENG Zhao-peng   

  • Online:2018-11-14 Published:2018-11-14

摘要: 网络编码是网络通信领域中的一项重大突破,它改变了传统网络的存储转发模式,将路由与编码的信息处理技术相结合,极大地提高了网络传输效率。在技术研究和应用实践的过程当中,随着网络逆向工程技术手段的介入,与之相关的技术合法性问题也再一次引起信息技术领域和法律领域的共同关注,尤其是“合理使用”原则的适用性颇具争议。网络编码的技术特征一定程度上可以反映对网络编码的逆向工程技术手段是否符合“合理使用”原则,进而触及针对网络编码的逆向工程技术合法性问题及相关可适用的原则。

关键词: 网络编码,逆向工程,合理使用,知识产权保护

Abstract: Network coding is a significant break-through in the field of network communications.It transformes the store-and-forward mode of traditional network and combines the information processing technologies of routing and coding,bringing in a great progress of network transmission efficiency.In the procedure of technology research and application,the intervene of network reverse engineering leads to a common attention and discussion of the intellectual property issue across the field of IT and law,especially for the topic of Fair Use.This article first studied the technical features of network coding,and then made an analysis of the legitimacy of network reverse engineering towards network coding upon the theory of Fair Use and network coding,coming up with proper principles.

Key words: Network coding,Reverse engineering,Fair use,Intellectual property protection

[1] Ahlswede R,Cai Ning,Li Shuo-yen,et al.Network information flow[J].IEEE Transactions on Information Theory,2000,46(4):1204-1216
[2] 陶少国,黄佳庆,杨宗凯,等.网络编码研究综述[J].小型微型计算机系统,2008,29(4):583-592
[3] 张盛勇,陈世康.网络编码的安全问题初探[J].通信技术,2012,45(1):105-107
[4] Kienle H M,Müller H A.Rigi—An environment for software reverse engineering,exploration,visualization,and redocumentation[J].S cience of Computer Programming,2010,75(4):247-263
[5] 熊志强,黄佳庆,刘威,等.无线网络编码综述[J].计算机科学,2007,34(3):6-9
[6] 严秀,李龙澍.软件逆向工程技术研究[J].计算机技术与发展,2009,19(4):20-24
[7] Zhou Hui,Du Wen-cai.How Network Reverse Engineering Differs from Software Reverse Engineering[J].Wireless Communications and Applications ,2012,72(1):33-43
[8] Wondracek G,Comparetti M P,Kruegel C,et al.Automatic network protocol analysis[C]∥Proceedings of the Network and Distributed System Security Symposium,2008.San Diego,California,USA,2008
[9] 何永君,舒辉,熊小兵.基于动态二进制分析的网络协议逆向解析[J].计算机工程,2010,36(9):268-270
[10] Cui Wei-dong,Kannan J,Wang H J.Discoverer:automatic protocol reverse engineering from network traces[C]∥SS’07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium,2007.CA,USA,2007
[11] Antunes J,Neves N,Verissimo P.Reverse Engineering of Proto-cols from Network Traces[C]∥2011 18th Working Conference on Reverse Engineering (WCRE).Limerick,Ireland:IEEE,2011:169-178
[12] 彭磊,袁海,曾家智.无线传感器网络的协议再工程与方法研究[J].计算机集成制造系统,2008,14(6):1236-1243
[13] 黄政,王新.网络编码中的优化问题研究[J].软件学报,2009,20(5):1349-1361
[14] 刘外喜,余顺争,蔡君.安全的网络编码所面临的挑战和对策[J].计算机科学,2011,38(6):20-27
[15] 曹张华,唐元生.安全网络编码综述[J].计算机应用,2010,30(2):499-504
[16] Pamela S,Suzanne S.Law and Economics of Reverse Enginee-ring[J].Yale Law Journal,2002,111(7):1575-1664
[17] Madison M J.Some Optimism About Fair Use and CopyrightLaw[J].Journal of the Copyright Society of the USA,2010,57(3):351-370
[18] 张志斌,高峰,唐朝京.净室软件工程中的关键技术研究[J].计算机应用研究,2003,20(2):17-20

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!