Analysis of reverse engineering

被引:0
|
作者
Nurgaliyev, Alibek [1 ]
Wang, Hua [1 ]
机构
[1] Victoria Univ, Inst Sustainable Ind & Liveable Cities, Melbourne, Vic, Australia
关键词
Reverse engineering; Software engineering; Cyber security; Android; Mobile; PRIVACY; MODELS;
D O I
10.1109/ICACI58115.2023.10146175
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The significance of cybercrime as a threat has significantly increased in the last decade, making cybersecurity a crucial issue for organizations, government agencies, and the general use of information technologies. According to the Australian Cybersecurity Center (ACSC), organizations worldwide face significant risks to their internal infrastructure, and therefore require cybersecurity professionals. This study aims to conduct an in-depth analysis of the reverse engineering process and offer practical solutions for reverse engineering methods. Through the examination of a product's source code, software reverse engineering can reconstruct its original intent, features, and specifications. A database of programs is then created, and data is obtained from it. Reverse engineering is conducted on different systems to facilitate their maintenance by increasing transparency and producing relevant documentation.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Leveraging program analysis for Web site reverse engineering
    Kienle, HM
    Müller, HA
    WSE 2001: 3RD INTERNATIONAL WORKSHOP ON WEB SITE EVOLUTION, 2001, : 117 - 125
  • [22] Windows driver memory analysis: A reverse engineering methodology
    Okolica, James S.
    Peterson, Gilbert L.
    COMPUTERS & SECURITY, 2011, 30 (08) : 770 - 779
  • [23] Reverse Engineering Digital Circuits Using Functional Analysis
    Subramanyan, Pramod
    Tsiskaridze, Nestan
    Pasricha, Kanika
    Reisman, Dillon
    Susnea, Adriana
    Malik, Sharad
    DESIGN, AUTOMATION & TEST IN EUROPE, 2013, : 1277 - 1280
  • [24] Reverse Engineering an IPhone Applications using Dynamic Analysis
    Dugerdil, Philippe
    Sako, Roland
    2015 10TH INTERNATIONAL JOINT CONFERENCE ON SOFTWARE TECHNOLOGIES (ICSOFT), VOL 1, 2015, : 261 - 268
  • [25] Reverse data engineering into a distributed environment - A metadata analysis
    Aiken, P
    Girling, B
    INFORMATION SYSTEMS MANAGEMENT, 1998, 15 (03) : 47 - 55
  • [26] RETURN ON INVESTMENT ANALYSIS FOR IMPLEMENTING BARRIERS TO REVERSE ENGINEERING
    Knight, Darren C.
    Mattson, Christopher A.
    PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, 2011, VOL 5, PTS A AND B, 2012, : 977 - 986
  • [27] Engineering section analysis based on automatic feature points matching in reverse engineering
    Shu, Lingjie
    PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON MECHATRONICS, CONTROL AND MATERIALS (ICMCM 2016), 2016, 104 : 691 - 694
  • [28] Reverse Engineering and the Application of Reverse Engineering IN Mould Design and Manufacture
    Chen, Zhuo
    Zhao, Chong
    Zhang, Hong
    Chen, Yangyang
    Tang, Ping
    COMPUTING, CONTROL AND INDUSTRIAL ENGINEERING IV, 2013, 823 : 594 - 597
  • [29] Reverse-engineering Reverse Mathematics
    Sanders, Sam
    ANNALS OF PURE AND APPLIED LOGIC, 2013, 164 (05) : 528 - 541
  • [30] Reverse engineering for software performance engineering
    Mobley, Kevin
    14TH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS, 2007, : 302 - 303