Published Papers

  1. Reverse Engineering: Decipher of elementary Software's using rudimentary tools
    Romil Gandhi, Deesha Vora, Prof.Vinayak Shinde

    Reverse engineering is a process of analysing, decompiling, debugging, and if required making patches in software for uncovering the limitations. Reverse engineering: 1) It is a field in computer engineering which helps to decode the applications to solve the determined purpose. It is the last phase after the application is fully developed and tested i.e. when it is in production phase. 2) It can be used by almost all industries for the betterment of software which is self-developed. It can be used to remove the software glitches, to do better with the security aspect and can be used to optimize the performance of software. 3) It is a way where the particular applications executable is open differently to find the source code instead of running normally. It is exactly opposite of the software development cycle which is used to design application. 4) As the name states that going back from the end point to start point in a linear fashion for accessing and uncovering the features of an application. [Full-Text]

  2. GSM Networks: Substantiation of GSM Stationed algorithm
    Romil Gandhi, Amitha Nair, Jason D'Souza

    Global System for Mobile Communications also referred to as GSM, is a standard developed by the ETSI (European Telecommunications Standards Institute) which consist of protocols defined for 2G networks used for mobile phones. Wireless as per the frequency of operation and access legality, various applications are distributed. GSM is a second- generation digital mobile cellular communication standard with international roaming initiated by ETSI. It uses two 25GHz frequency bands (890GHz- 915GHz for reverse link and 935GHz- 960GHz for forward link). It uses FDD (frequency division duplexing) and combination of TDMA and FDMA for access between users. [Full-Text]

    Romil Gandhi, Prof. Madhuri Gedam, Prof. Sachin Bojewar

    This paper discusses different uses of reverse engineering (RE), as well as the change in its original use for beneficial purposes to negative ones. A comparative study of different techniques used for RE is performed, and proposals to improve security are made. These include the obfuscation technique used for Java, and protection from RE using the proposed hardware system. [In Process]

    Romil Gandhi, Prof. Vinayak Shinde, Prof. Sachin Bojewar

    This paper presents the concept of persuasive (graphical) cued click points (PCCP), and discusses their usability and evolution. A local survey regarding the largest issue in security was conducted with developers of various applications. This paper also describes the disadvantages of PCCP for desktop-based applications. The system proposed in this paper is different from PCCP in terms of usability and security. PCCP is a web-based system that does not provide the functionality required by desktop-based applications. To this end, this paper provides the concept of text-based password with PCCP that can be used to protect such applications. [In Process]