As such systems are upgraded, they must comply with the latest certification requirements, which include in-depth analysis such as
Object Code Verification.
Object code consists of "the pure instructional data that is created to run directly on a computer's processor." (59) It is often referred to as assembly code.
Reverse engineering is the process of transforming a computer program from its
object code form into a form intelligible by humans so that engineers can study its underlying elements.
And each time a new type of interaction is developed, the
object code developed can then be used in other applications.
Once you have acquired a customer diskette of the suspect program, your technician can print out the
object code. A number of law review articles have suggested that the code is useless in source-code litigation because programmers can't read it.
Despite the obviously technical nature of computer programs, copyright law now protects software as a form of literary work.(16) This decision in large part is due to a detailed study made for Congress by the National Commission on New Technological Uses of Copyrighted Works (CONTU), which proposed copyright as a solution to the many problems of protecting software.(17) Copyright protection has been upheld for all different forms of software,(18) regardless of how they are stored(19) or whether they are written in
object code or source code.(20) Computer programs do bear a number of similarities to more traditional literary works: they are written, they are easily duplicated,(21) and they are the product of creative, intellectual labor.
For example, when developing the
object code listing, start by identifying major
object code categories and then work to define detail to the extent necessary.
Security and encryption modules are also supplied with 100 percent source and
object code coverage testing and full MC-DC analysis to deliver the highest level of reliability.