Automated Reverse Engineering Tool

نویسنده

  • Ramakrishnan Ravindran
چکیده

: Network security plays an increasingly important role in technology. As the world gets more and more interconnected, the need for security increases. While there are several tools that offer a fair amount of security, it is still crucial that students are educated well on the design and operation of malware, and learn to develop countermeasures that prevent malicious activity. To assist in this, we developed a software package that studies the actions of known or suspected malware in a controlled environment, and provides information on the effects of malware on the system without actually compromising a system. By means of a virtual environment, this program collects data before and after the malware has infected the virtual machine. Comparison between the two aids in understanding the working of the malware and identifying system weaknesses. Several reverse engineering techniques have been implemented to collect vital information about the malware being simulated. This tool is invaluable to an educator seeking to show students the impact of a certain virus or the effects of a Denial of Service attack. It also acts as the starting step in the reverse engineering process, so that students realize the potential of malicious software and also learn the process of reverse engineering. This software is also a platform for further research in reverse

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reverse Engineering with a CASE Tool

We examine using a CASE tool, Interactive Development Environ-ment's Software through Pictures (StP), to support reverse engineering. We generate structure charts in StP from the automated analysis of C source code. The advantages of this approach are that one can use the CASE tool's support for drawing, linking, and modifying pictorial notations for program design in order to make it easier to...

متن کامل

GUIsurfer: A Reverse Engineering Framework for User Interface Software

In the context of developing tool support to the automated analysis of interactive systems implementations, this chapter proposal aims to investigate the applicability of reverse engineering approaches to the derivation of user interfaces behavioural models. The ultimate goal is that these models might be used to reason about the quality of the system, both from an usability and an implementati...

متن کامل

Partial Automation of an Integrated Reverse Engineering Environment of Binary Code

The constant development of newer and faster machines requires software to be made available on those new machines at a rate faster than what it takes to develop the software. The use of binary translation techniques to migrate software from one machine to another is effective—it makes software available in little time without incurring reprogramming costs. However, the development of such a to...

متن کامل

REM4j - A Framework for Measuring the Reverse Engineering Capability of UML CASE Tools

Reverse Engineering is becoming increasingly important in the software development world today as many organizations are battling to understand and maintain old legacy systems. Today’s software engineers have inherited these legacy systems which they may know little about yet have to maintain, extend and improve. Currently there is no framework or strategy that an organisation can use to determ...

متن کامل

Automated Tutorial and Assignment Assessment

Computer simulation is used extensively both as an educational tool and within industry. It can be employed as a means of developing a new process or system or as a means of experimenting with an existing system. The simulation exercises described in this paper aim to provide students with the ability to use and create computer models. The input parameters for the simulations are based on stude...

متن کامل

ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow

Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006