Reverse engineering is undoing or circumventing the protections deployed on a code region. Software crackers perform this to remove license checks in commercial applications and video games, but it can also be done for legitimate purposes. Many software houses perform a security assessment phase by reverse engineering their protected software before releasing it to the market. Furthermore, anti-virus experts need to reverse engineering malware (e.g., viruses and ransomware) to understand how it works and spreads. Typically, reverse engineering is performed by hand with minimal computer support with debuggers, decompilers, and disassemblers. Nevertheless, in recent years, new research directions have proposed various promising automatic methods, primarily based on machine learning and symbolic execution techniques.

Computer-Aided Reverse Engineering of Protected Software / Canavese, Daniele; Regano, Leonardo; Lioy, Antonio (COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE). - In: Digital Sovereignty in Cyber Security: New Challenges in Future Vision / Skarmeta A., Canavese D., Lioy A., Matheu S.. - STAMPA. - [s.l] : Springer, 2023. - ISBN 978-3-031-36095-4. - pp. 3-15 [10.1007/978-3-031-36096-1_1]

Computer-Aided Reverse Engineering of Protected Software

Daniele Canavese;Leonardo Regano;Antonio Lioy
2023

Abstract

Reverse engineering is undoing or circumventing the protections deployed on a code region. Software crackers perform this to remove license checks in commercial applications and video games, but it can also be done for legitimate purposes. Many software houses perform a security assessment phase by reverse engineering their protected software before releasing it to the market. Furthermore, anti-virus experts need to reverse engineering malware (e.g., viruses and ransomware) to understand how it works and spreads. Typically, reverse engineering is performed by hand with minimal computer support with debuggers, decompilers, and disassemblers. Nevertheless, in recent years, new research directions have proposed various promising automatic methods, primarily based on machine learning and symbolic execution techniques.
2023
978-3-031-36095-4
978-3-031-36096-1
Digital Sovereignty in Cyber Security: New Challenges in Future Vision
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2979633