TY - GEN
T1 - Tools and Models for Software Reverse Engineering Research
AU - Faingnaert, Thomas
AU - Zhang, Tab
AU - Van Iseghem, Willem
AU - Everaert, Gertjan
AU - Coppens, Bart
AU - Collberg, Christian
AU - De Sutter, Bjorn
N1 - Publisher Copyright:
© 2024 Copyright held by the owner/author(s).
PY - 2024/11/19
Y1 - 2024/11/19
N2 - Software protection researchers often struggle with the evaluation of MATE software protections and attacks. Evaluations often are incomplete and not representative of the practice. This can in part be explained by a lack of standardized, generally applicable models, tools, and methodologies for evaluating how reverse engineering attack strategies are executed. The framework of related components proposed in this paper is an attempt to provide exactly that. It includes a meta-model and supporting tools for modeling the knowledge that reverse engineers acquire as they execute their strategies, a meta-model to estimate the required effort of those strategies, and tools to capture strategic activities from data streams collected during human reverse engineering experiments. Their use is demonstrated on three example reverse engineering strategies.
AB - Software protection researchers often struggle with the evaluation of MATE software protections and attacks. Evaluations often are incomplete and not representative of the practice. This can in part be explained by a lack of standardized, generally applicable models, tools, and methodologies for evaluating how reverse engineering attack strategies are executed. The framework of related components proposed in this paper is an attempt to provide exactly that. It includes a meta-model and supporting tools for modeling the knowledge that reverse engineers acquire as they execute their strategies, a meta-model to estimate the required effort of those strategies, and tools to capture strategic activities from data streams collected during human reverse engineering experiments. Their use is demonstrated on three example reverse engineering strategies.
KW - reverse engineering
KW - strategy modeling, simulation, and capturing
UR - http://www.scopus.com/inward/record.url?scp=85214131907&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85214131907&partnerID=8YFLogxK
U2 - 10.1145/3689934.3690817
DO - 10.1145/3689934.3690817
M3 - Conference contribution
AN - SCOPUS:85214131907
T3 - CheckMATE 2024 - Proceedings of the 2024 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) attacks, Co-Located with: CCS 2024
SP - 44
EP - 58
BT - CheckMATE 2024 - Proceedings of the 2024 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) attacks, Co-Located with
PB - Association for Computing Machinery, Inc
T2 - 2024 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) attacks, CheckMATE 2024, held as part of the ACM Conference on Computer and Communications Security, CCS 2024
Y2 - 14 October 2024 through 18 October 2024
ER -