Analysis of reverse engineering

被引:0
|
作者
Nurgaliyev, Alibek [1 ]
Wang, Hua [1 ]
机构
[1] Victoria Univ, Inst Sustainable Ind & Liveable Cities, Melbourne, Vic, Australia
来源
2023 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE, ICACI | 2023年
关键词
Reverse engineering; Software engineering; Cyber security; Android; Mobile; PRIVACY; MODELS;
D O I
10.1109/ICACI58115.2023.10146175
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The significance of cybercrime as a threat has significantly increased in the last decade, making cybersecurity a crucial issue for organizations, government agencies, and the general use of information technologies. According to the Australian Cybersecurity Center (ACSC), organizations worldwide face significant risks to their internal infrastructure, and therefore require cybersecurity professionals. This study aims to conduct an in-depth analysis of the reverse engineering process and offer practical solutions for reverse engineering methods. Through the examination of a product's source code, software reverse engineering can reconstruct its original intent, features, and specifications. A database of programs is then created, and data is obtained from it. Reverse engineering is conducted on different systems to facilitate their maintenance by increasing transparency and producing relevant documentation.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] REVERSE ENGINEERING AND DATA FLOW DIAGRAMS IN ADA ENVIRONMENT
    CANFORA, G
    CIMITILE, A
    DECARLINI, U
    MICROPROCESSING AND MICROPROGRAMMING, 1990, 30 (1-5): : 357 - 364
  • [42] Connecting Design and Engineering Physics with Reverse Engineering
    Lur, Khim Tiam
    Tan, Da Yang
    Cheah, Chin Wei
    Lee, Chee Huei
    PROCEEDINGS OF THE 2022 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON 2022), 2022, : 571 - 578
  • [43] CARE: a platform for reliable Comparison and Analysis of Reverse-Engineering techniques
    Lamprier, Sylvain
    Baskiotis, Nicolas
    Ziadi, Tewfik
    Hillah, Lom Messan
    2013 18TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2013, : 252 - 255
  • [44] Precision Analysis and Control of the Mold Rapid Development based on Reverse Engineering
    Fan, Jun
    Wang, Leigang
    MECHANICAL, ELECTRONIC AND ENGINEERING TECHNOLOGIES (ICMEET 2014), 2014, 538 : 83 - +
  • [45] Operability Analysis and Conception of Microreactor by Integration of Reverse Engineering and Rapid Manufacturing
    Jardini, Andre L.
    Costa, Maria Carolina B.
    Bineli, Aulus R. R.
    Romao, Andresa F.
    Maciel Filho, Rubens
    18TH EUROPEAN SYMPOSIUM ON COMPUTER AIDED PROCESS ENGINEERING, 2008, 25 : 853 - 858
  • [46] Open Source Hardware Design and Hardware Reverse Engineering: A Security Analysis
    Baehr, Johanna
    Hepp, Alexander
    Brunner, Michaela
    Malenko, Maja
    Sigl, Georg
    2022 25TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2022, : 504 - 512
  • [47] Power analysis for secret recovering and reverse engineering of public key algorithms
    Amiel, Frederic
    Feix, Benoit
    Villegas, Karine
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 110 - +
  • [48] Reverse engineering and analysis of large genome-scale gene networks
    Aluru, Maneesha
    Zola, Jaroslaw
    Nettleton, Dan
    Aluru, Srinivas
    NUCLEIC ACIDS RESEARCH, 2013, 41 (01) : e24
  • [49] Reverse Engineering of Cryptographic Cores by Structural Interpretation through Graph Analysis
    Werner, Michael
    Lippmann, Bernhard
    Baehr, Johanna
    Graeb, Helmut
    2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2018, : 13 - 18
  • [50] Analysis of Ransomware Using Reverse Engineering Techniques to Develop Effective Countermeasures
    Alsharabi, Naif
    Alshammari, Mariam F.
    Alharbi, Yasser
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (02) : 284 - 294