Improving tool support for software reverse engineering in a security context

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Illegal cyberspace activities are increasing rapidly and many software engineers are using reverse engineering methods to respond to attacks. The security-sensitive nature of these tasks, such as the understanding of malware or the decryption of encrypted content, brings unique challenges to reverse engineering: work has to be done offline, files can rarely be shared, time pressure is immense, and there is a lack of tool and process support for capturing and sharing the knowledge obtained while trying to understand assembly code. To help us gain an understanding of this reverse engineering work, we conducted an exploratory study at a government research and development organization to explore their work processes, tools, and artifacts [1]. We have been using these findings to improve visualization and collaboration features in assembly reverse engineering tools. In this talk, we will present a review of the findings from our study, and present prototypes we have developed to improve capturing and sharing knowledge while analyzing security concerns. © 2013 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Cleary, B., Treude, C., Filho, F. F., Storey, M. A., & Salois, M. (2013). Improving tool support for software reverse engineering in a security context. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8027 LNAI, pp. 113–122). https://doi.org/10.1007/978-3-642-39454-6_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free