An empirical examination of the reverse engineering process for binary files

被引:19
|
作者
Sutherland, Iain [1 ]
Kalb, George E.
Blyth, Andrew
Mulley, Gaius
机构
[1] Univ Glamorgan, Sch Comp, Treforest, Wales
[2] Johns Hopkins Univ, Informat Secur Inst, Baltimore, MD USA
关键词
reverse engineering; software protection; process metrics; binary code; complexity metrics;
D O I
10.1016/j.cose.2005.11.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reverse engineering of binary code file has become increasingly easier to perform. The binary reverse engineering and subsequent software exploitation activities represent a significant threat to the intellectual property content of commercially supplied software products. Protection technologies integrated within the software products offer a viable solution towards deterring the software exploitation threat. However, the absence of metrics, measures, and models to characterize the software exploitation process prevents execution of quantitative assessments to define the extent of protection technology suitable for application to a particular software product. This paper examines a framework for collecting reverse engineering measurements, the execution of a reverse engineering experiment, and the analysis of the findings to determine the primary factors that affect the software exploitation process. The results of this research form a foundation for the specification of metrics, gathering of additional measurements, and development of predictive models to characterize the software exploitation process. (C) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:221 / 228
页数:8
相关论文
共 50 条
  • [1] Visual reverse engineering of binary and data files
    Conti, Gregory
    Dean, Erik
    Sinda, Matthew
    Sangster, Benjamin
    VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS, 2008, 5210 : 1 - 17
  • [2] Binary Reverse Engineering for All
    Aycock, John
    PROCEEDINGS OF THE 2023 CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, ITICSE 2023, VOL 1, 2023, : 243 - 249
  • [3] Empirical reverse engineering of the pricing kernel
    Chernov, M
    JOURNAL OF ECONOMETRICS, 2003, 116 (1-2) : 329 - 364
  • [4] Workshop on empirical studies in reverse engineering
    Tonella, Paolo
    13TH IEEE INTERNATIONAL WORKSHOP ON SOFTWARE TECHNOLOGY AND ENGINEERING PRACTICE, PROCEEDINGS, 2006, : 61 - +
  • [5] Reverse engineering in process automation
    Ressel, Alexander
    Schmidt-Vollus, Ronald
    2021 26TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2021,
  • [6] THE REVERSE ENGINEERING PROCESS - A COMPETITION ENGINEERING PERSPECTIVE
    DIMASCIO, AJ
    MIXON, CO
    NAVAL ENGINEERS JOURNAL, 1988, 100 (02) : 47 - 53
  • [7] On the Representation of Results of Binary Code Reverse Engineering
    V. A. Padaryan
    I. N. Ledovskikh
    Programming and Computer Software, 2018, 44 : 200 - 206
  • [8] Reverse Engineering of Binary Device Drivers with RevNIC
    Chipounov, Vitaly
    Candea, George
    EUROSYS'10: PROCEEDINGS OF THE EUROSYS 2010 CONFERENCE, 2010, : 167 - 180
  • [9] On the Representation of Results of Binary Code Reverse Engineering
    Padaryan, V. A.
    Ledovskikh, I. N.
    PROGRAMMING AND COMPUTER SOFTWARE, 2018, 44 (03) : 200 - 206
  • [10] Anti-Reverse-Engineering Tool of Executable Files on the Windows Platform
    Luo Chenke
    Yuan Feng
    Gao Qiyuan
    Yang Jiateng
    Xu Jian
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 797 - 800