Publication Type
Conference Proceeding Article
Version
publishedVersion
Publication Date
10-2011
Abstract
Illegal cyberspace activities are increasing rapidly and many software engineers are using reverse engineering methods to respond to attacks. The security-sensitive nature of these tasks, such as the understanding of malware or the decryption of encrypted content, brings unique challenges to reverse engineering: work has to be done offline, files can rarely be shared, time pressure is immense, and there is a lack of tool and process support for capturing and sharing the knowledge obtained while trying to understand plain assembly code. To help us gain an understanding of this reverse engineering work, we report on an exploratory study done in a security context at a research and development government organization to explore their work processes, tools, and artifacts. In this paper, we identify challenges, such as the management and navigation of a myriad of artifacts, and we conclude by offering suggestions for tool and process improvements.
Keywords
exploratory study, reverse engineering, security setting
Discipline
Software Engineering
Research Areas
Software and Cyber-Physical Systems
Publication
WCRE 2011: Proceedings of the 18th Working Conference on Reverse Engineering, Limerick, Ireland, October 17-20
First Page
184
Last Page
188
ISBN
9780769545820
Identifier
10.1109/WCRE.2011.30
Publisher
IEEE
City or Country
Piscataway, NJ
Citation
TREUDE, Christoph; FIGUEIRA FILHO, Fernando; STOREY, Margaret-Anne; and SALOIS, Martin.
An exploratory study of software reverse engineering in a security context. (2011). WCRE 2011: Proceedings of the 18th Working Conference on Reverse Engineering, Limerick, Ireland, October 17-20. 184-188.
Available at: https://ink.library.smu.edu.sg/sis_research/8934
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1109/WCRE.2011.30