Sciweavers

57 search results - page 1 / 12
» Reverse Engineering Self-Modifying Code: Unpacker Extraction
Sort
View
WCRE
2010
IEEE
13 years 3 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
WCRE
2009
IEEE
13 years 11 months ago
Automatic Static Unpacking of Malware Binaries
—Current malware is often transmitted in packed or encrypted form to prevent examination by anti-virus software. To analyze new malware, researchers typically resort to dynamic c...
Kevin Coogan, Saumya K. Debray, Tasneem Kaochar, G...
RE
2005
Springer
13 years 10 months ago
Reverse Engineering Goal Models from Legacy Code
A reverse engineering process aims at reconstructing el abstractions from source code. This paper presents a novel reverse engineering methodology for recovering stakeholder goal ...
Yijun Yu, Yiqiao Wang, John Mylopoulos, Sotirios L...
ICSM
2003
IEEE
13 years 10 months ago
Reverse Engineering of the Interaction Diagrams from C++ Code
In object oriented programming, the functionalities of a system result from the interactions (message exchanges) among the objects allocated by the system. While designing object ...
Paolo Tonella, Alessandra Potrich
WCRE
1999
IEEE
13 years 9 months ago
Reusing Domains for the Construction of Reverse Engineering Tools
One of the challenges of reverse engineering is the extraction of a specification from source code. Our work proposes a singular approach to the construction of reverse engineerin...
Felipe Gouveia de Freitas, Julio Cesar Sampaio do ...