skip to main content
article
Free Access

Practical legal aspects of software reverse engineering

Published:01 February 1998Publication History
First page image

References

  1. 1 AtariG an esCorp.v.N intendo ofAm ~, Inc., 975 F2d 832 ~ed. Cir. 1992).Google ScholarGoogle Scholar
  2. 2 Atar~ 975 F. 2d at 843. The aourt noted that {b}~ca}se Atariwas not in autho~ postilion of the C opyright O fEme aopy of 1 ON E S, any aopying ord~ aopying ofl0N ES souroe aode ~m theC opyr}ght O fEhe does not qua}fify as a fair use."Google ScholarGoogle Scholar
  3. 3 D avis, G., TTT. Saope ofprotsctJan of c~m puter-basm~ woJ<s" Revem~ engineering ~ roa~ s and d~r~ pJ3atJan. In 15th Annual ~~ Law Institute H~ S~i es (Pate't, C_xTyri g"t, TradeTarks ard Li te~ary Prq~ty Co~r~) , 1993, pages i-i 5.Google ScholarGoogle Scholar
  4. 4 977 F.2d at 1527.Google ScholarGoogle Scholar
  5. 5 740 F. Supp. 37 0 .M a~., 1990).Google ScholarGoogle Scholar
  6. 6 Harper & Row, 471 U S. afi562-63 (~here the courtnot~d thafiknow- '~ood fag_h" and 'Yair demlings" underpinnings of fair use doctrine).Google ScholarGoogle Scholar
  7. 7 Hayes, D . The }~ga}Jfly of d~ bly of a}m purer prog~ s. C07} p_~./LawJ. 14, 1 (Jan.1992), 4-12.Google ScholarGoogle Scholar
  8. 8 Lewis Galoob Toys, Inc. v. N intmndo ofAm edca, Inc., 780 F. Supp. 1283 N D . Cal. 1991), af~d 964 F2d 965 (9th Cir.1992) (~here G a}oob m anufadmred the G an e G enie, w hich atYmahed to N intendo's video gan e cartridges and m cd~ the gan e tsm po~mily to aker certain gan e ago~cts, s}ch as allow ing the p}ayer to obtain m ore "~' in a stmeet battEe. T he aourt held revem~ engineering to be an appropriate usein orderto desi~Tn this attadnm ~:ntto w oJ< wJthN intendo's gain es).Google ScholarGoogle Scholar
  9. 9 M aS abe, P. R evem~ engineering of c~m puter soflm are" A tm~p fDr the unw ary? C07~. L. AgEr, Bul. I, 2 ~eb. 1994), 1-15.Google ScholarGoogle Scholar
  10. 10 SegaEnterpr~Ltd.v.Aacoflade, Inc., 977 F .2d 1510 (9th Cir. 1992).Google ScholarGoogle Scholar
  11. 11 W heflan A~, Inc.v. Jaslow D entalLab, Inc., 797 F .2d 1222 (3~fl Cir. 1986), aertd~nJ~d, 479 U S. 1031 (1987) (~herethe oourtdevJsed an approach to di-IT~:r~tfia~pro~ express~n ~ unprotected :E.Lnctbns and Jd~gs, an approach that has be~n roundly criticismS).Google ScholarGoogle Scholar

Index Terms

  1. Practical legal aspects of software reverse engineering

      Recommendations

      Reviews

      Gregory M. Aharonian

      The apparent errors in this paper are more interesting than the suggestions it makes. While mentioning some important cases, such as Nintendo versus Atari, Sega versus Accolade, and Lotus versus Paperback, the authors point out five basic rules of intellectual property as it applies to reverse engineering: Obtain an authorized copy of the software you want to reverse engineer. (Atari had misrepresented to the Copyright Office why it wanted Nintendos source code.) Also, do not violate any licensing agreements signed with the company whose software you want to reverse engineer. Make sure there are no other ways of obtaining the information in the software other than by reverse engineering. Reverse engineer only those parts of the software you have some interest in. If you adopt much more, you will run into copyright problems. Have two groups involved: one to reverse engineer the original program, the other to develop new software. Research to see if what you want to reverse engineer is patented. In general, this is sound advice. What worries me is that the analysis of some of the examples used to illustrate these points is either partially incorrect, simplistic, or just plain wrong, bringing the relevance of the entire paper into question. First, in discussing reverse engineering while avoiding copyright infringement, the authors write: In Lotus Development Corp. v. Paperback Software International, the court held that Paperback infringed on Lotuss copyrighted software by devising its spreadsheet to have a look and feel similar to Lotuss popular 1-2-3 spreadsheet. Rather than copy only the functional elements of 1-2-3, Paperback had essentially copied much of Lotuss aesthetic qualities as well. This statement is misleading in that it tells part of a story. Lotus was involved with two copyright cases—one versus Paperback, and another versus Borland. In Lotus v. Paperback , Paperback had pretty much copied the entire user interface, except that it had moved the menu bar from the top to the bottom of the screen (or vice versa). Borland, on the other hand, allowed its menus to use the same hierarchy of menu commands, so that it could easily sell to the base of installed Lotus users. The look and feel of the user interfaces of Quattro Pro and Lotus were completely different. While Lotus initially prevailed over Borland in 1990, in 1995 the Court of Appeals for the First Circuit reversed the original 1990 ruling, and in 1996 the Supreme Court upheld the reversal. So this example introduces a nontrivial problem in software copyrights, and the brief treatment is misleading. Second, the authors say that “software developers should conduct research on the product to be reverse engineered to ensure that patent law does not provide protection for the particular process or function that is to be reverse engineered and used in a new program.” Again, this is true, but somewhat simplistic. Several lawyers have told me that they sometimes advise their clients not to do patent prior art searching because of rules imposing triple damages for willful infringement, which could be argued on the basis of searching patents for any reason. While I agree with the authors that the search should be done, they should have mentioned the possibility of triple damages. Third, as part of this discussion of patents, the authors write, “Due to rigorous requirements that must be met in order to get a patent on a certain function or process, few programs are patented.” This is pure nonsense. In 1997 alone, over 13,000 software patents were issued, and about 80,000 total will have been issued by the end of the decade. You cannot apply the term “rigor” to a system that awarded a patent for a 3D pie chart in 1996 (patent number 5,491,779). In short, some straightforward advice is backed up with some misleading information.

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 41, Issue 2
        Feb. 1998
        77 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/269012
        Issue’s Table of Contents

        Copyright © 1998 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 February 1998

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader