Computer Science ›› 2014, Vol. 41 ›› Issue (11): 12-15.doi: 10.11896/j.issn.1002-137X.2014.11.003

Previous Articles     Next Articles

Legitimacy Analysis of Reverse Engineering Technique towards Network Coding

DU Xing-zhou,XU Chao and MENG Zhao-peng   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Network coding is a significant break-through in the field of network communications.It transformes the store-and-forward mode of traditional network and combines the information processing technologies of routing and coding,bringing in a great progress of network transmission efficiency.In the procedure of technology research and application,the intervene of network reverse engineering leads to a common attention and discussion of the intellectual property issue across the field of IT and law,especially for the topic of Fair Use.This article first studied the technical features of network coding,and then made an analysis of the legitimacy of network reverse engineering towards network coding upon the theory of Fair Use and network coding,coming up with proper principles.

Key words: Network coding,Reverse engineering,Fair use,Intellectual property protection

[1] Ahlswede R,Cai Ning,Li Shuo-yen,et al.Network information flow[J].IEEE Transactions on Information Theory,2000,46(4):1204-1216
[2] 陶少国,黄佳庆,杨宗凯,等.网络编码研究综述[J].小型微型计算机系统,2008,29(4):583-592
[3] 张盛勇,陈世康.网络编码的安全问题初探[J].通信技术,2012,45(1):105-107
[4] Kienle H M,Müller H A.Rigi—An environment for software reverse engineering,exploration,visualization,and redocumentation[J].S cience of Computer Programming,2010,75(4):247-263
[5] 熊志强,黄佳庆,刘威,等.无线网络编码综述[J].计算机科学,2007,34(3):6-9
[6] 严秀,李龙澍.软件逆向工程技术研究[J].计算机技术与发展,2009,19(4):20-24
[7] Zhou Hui,Du Wen-cai.How Network Reverse Engineering Differs from Software Reverse Engineering[J].Wireless Communications and Applications ,2012,72(1):33-43
[8] Wondracek G,Comparetti M P,Kruegel C,et al.Automatic network protocol analysis[C]∥Proceedings of the Network and Distributed System Security Symposium,2008.San Diego,California,USA,2008
[9] 何永君,舒辉,熊小兵.基于动态二进制分析的网络协议逆向解析[J].计算机工程,2010,36(9):268-270
[10] Cui Wei-dong,Kannan J,Wang H J.Discoverer:automatic protocol reverse engineering from network traces[C]∥SS’07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium,2007.CA,USA,2007
[11] Antunes J,Neves N,Verissimo P.Reverse Engineering of Proto-cols from Network Traces[C]∥2011 18th Working Conference on Reverse Engineering (WCRE).Limerick,Ireland:IEEE,2011:169-178
[12] 彭磊,袁海,曾家智.无线传感器网络的协议再工程与方法研究[J].计算机集成制造系统,2008,14(6):1236-1243
[13] 黄政,王新.网络编码中的优化问题研究[J].软件学报,2009,20(5):1349-1361
[14] 刘外喜,余顺争,蔡君.安全的网络编码所面临的挑战和对策[J].计算机科学,2011,38(6):20-27
[15] 曹张华,唐元生.安全网络编码综述[J].计算机应用,2010,30(2):499-504
[16] Pamela S,Suzanne S.Law and Economics of Reverse Enginee-ring[J].Yale Law Journal,2002,111(7):1575-1664
[17] Madison M J.Some Optimism About Fair Use and CopyrightLaw[J].Journal of the Copyright Society of the USA,2010,57(3):351-370
[18] 张志斌,高峰,唐朝京.净室软件工程中的关键技术研究[J].计算机应用研究,2003,20(2):17-20

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!