reAnalyst: Scalable annotation of reverse engineering activities

Tab (Tianyi) Zhang, Claire Taylor, Bart Coppens, Waleed Mebane, Christian Collberg, Bjorn De Sutter

Research output: Contribution to journalArticlepeer-review

Abstract

This paper introduces reAnalyst, a framework designed to facilitate the study of reverse engineering (RE) practices through the semi-automated annotation of RE activities across various RE tools. By integrating tool-agnostic data collection of screenshots, keystrokes, active processes, and other types of data during RE experiments with semi-automated data analysis and generation of annotations, reAnalyst aims to overcome the limitations of traditional RE studies that rely heavily on manual data collection and subjective analysis. The framework enables more efficient data analysis, which will in turn allow researchers to explore the effectiveness of protection techniques and strategies used by reverse engineers more comprehensively and efficiently. Experimental evaluations validate the framework's capability to identify RE activities from a diverse range of screenshots with varied complexities. Observations on past experiments with our framework as well as a survey among reverse engineers provide further evidence of the acceptability and practicality of our approach.

Original languageEnglish (US)
Article number112492
JournalJournal of Systems and Software
Volume229
DOIs
StatePublished - Nov 2025
Externally publishedYes

Keywords

  • Analysis tools
  • Empirical studies
  • Image analysis
  • Man-at-the-end attacks
  • Reverse engineering tools
  • Software protection

ASJC Scopus subject areas

  • Software
  • Information Systems
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'reAnalyst: Scalable annotation of reverse engineering activities'. Together they form a unique fingerprint.

Cite this