Reverse engineering is undoing or circumventing the protections deployed on a code region. Software crackers perform this to remove license checks in commercial applications and video games, but it can also be done for legitimate purposes. Many software houses perform a security assessment phase by reverse engineering their protected software before releasing it to the market. Furthermore, anti-virus experts need to reverse engineering malware (e.g., viruses and ransomware) to understand how it works and spreads. Typically, reverse engineering is performed by hand with minimal computer support with debuggers, decompilers, and disassemblers. Nevertheless, in recent years, new research directions have proposed various promising automatic methods, primarily based on machine learning and symbolic execution techniques.

Computer-Aided Reverse Engineering of Protected Software / Canavese, Daniele; Regano, Leonardo; Lioy, Antonio. - STAMPA. - 1807:(2023), pp. 3-15. (Intervento presentato al convegno First International Workshop, CyberSec4Europe 2022 tenutosi a Venice (IT) nel April 17–21, 2022) [10.1007/978-3-031-36096-1_1].

Computer-Aided Reverse Engineering of Protected Software

Daniele Canavese;Leonardo Regano;Antonio Lioy
2023

Abstract

Reverse engineering is undoing or circumventing the protections deployed on a code region. Software crackers perform this to remove license checks in commercial applications and video games, but it can also be done for legitimate purposes. Many software houses perform a security assessment phase by reverse engineering their protected software before releasing it to the market. Furthermore, anti-virus experts need to reverse engineering malware (e.g., viruses and ransomware) to understand how it works and spreads. Typically, reverse engineering is performed by hand with minimal computer support with debuggers, decompilers, and disassemblers. Nevertheless, in recent years, new research directions have proposed various promising automatic methods, primarily based on machine learning and symbolic execution techniques.
2023
978-3-031-36095-4
978-3-031-36096-1
File in questo prodotto:
File Dimensione Formato  
978-3-031-36096-1_1.pdf

accesso riservato

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 267.33 kB
Formato Adobe PDF
267.33 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2979633