Reverse code engineering: An in-depth analysis of the Bagle virus

被引:3
|
作者
Rozinov, K [1 ]
机构
[1] Polytech Univ, Dept Comp & Informat Sci, Brooklyn, NY 11201 USA
关键词
reverse code engineering; reverse engineering; RCE; bagle; beagle; virus; worm; functional flow; FFSig;
D O I
10.1109/IAW.2005.1495977
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper is the result of work done in the field of reverse code engineering and how it could be applied to better detecting viruses and worms. The goal of this paper is to try to answer the following two questions: How do you reverse engineer a virus and can reverse engineering a virus lead to better ways of detecting, preventing, and recovering from a virus and its future variants? In addition, the paper describes the Bagle virus, the resources and environment used for analysis, the approach and techniques used to completely reverse engineer the Bagle virus, and some of the analysis problems encountered and their solutions. It also presents some best practices to use while reverse code engineering.
引用
收藏
页码:380 / 387
页数:8
相关论文
共 50 条
  • [31] Scrum in a Software Engineering Course: An In-Depth Praxis Report
    Scharf, Andreas
    Koch, Andreas
    2013 IEEE 26TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING EDUCATION AND TRAINING (CSEE&T), 2013, : 159 - 168
  • [32] In-depth interfacial engineering for efficient indoor organic photovoltaics
    Shin, Sang-Chul
    You, Young-Jun
    Goo, Ji Soo
    Shim, Jae Won
    APPLIED SURFACE SCIENCE, 2019, 495
  • [33] A Code Obfuscation Technique to Prevent Reverse Engineering
    Dalai, Asish Kumar
    Das, Shakya Sundar
    Jena, Sanjay Kumar
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 828 - 832
  • [34] On the Representation of Results of Binary Code Reverse Engineering
    Padaryan, V. A.
    Ledovskikh, I. N.
    PROGRAMMING AND COMPUTER SOFTWARE, 2018, 44 (03) : 200 - 206
  • [35] Code Reverse Engineering Problem for Identification Codes
    Bringer, Julien
    Chabanne, Herve
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (04) : 2406 - 2412
  • [36] On the Representation of Results of Binary Code Reverse Engineering
    V. A. Padaryan
    I. N. Ledovskikh
    Programming and Computer Software, 2018, 44 : 200 - 206
  • [37] Obfuscation by Code Fragmentation to Evade Reverse Engineering
    Balachandran, Vivek
    Emmanuel, Sahu
    Keong, Ng Wee
    2014 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2014, : 463 - 469
  • [38] Reverse Engineering Legacy Finite Element Code
    Hoole, Samuel Ratnajeevan Herbert
    Arudchelvam, Thiruchelvam
    Wijayakulasooriya, Janaka
    APPLIED ELECTROMAGNETIC ENGINEERING FOR MAGNETIC, SUPERCONDUCTING AND NANO MATERIALS, 2012, 721 : 307 - +
  • [39] From Code to Design: A Reverse Engineering Approach
    Varoy, Elliot
    Burrows, John
    Sun, Jing
    Manoharan, Sathiamoorthy
    2016 21ST INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2016), 2016, : 181 - 186
  • [40] Reverse engineering 4.7 million lines of code
    Tonella, P
    Antoniol, G
    Fiutem, R
    Calzolari, F
    SOFTWARE-PRACTICE & EXPERIENCE, 2000, 30 (02): : 129 - 150