Tools and Models for Software Reverse Engineering Research

Thomas Faingnaert, Tab Zhang, Willem Van Iseghem, Gertjan Everaert, Bart Coppens, Christian Collberg, Bjorn De Sutter

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Software protection researchers often struggle with the evaluation of MATE software protections and attacks. Evaluations often are incomplete and not representative of the practice. This can in part be explained by a lack of standardized, generally applicable models, tools, and methodologies for evaluating how reverse engineering attack strategies are executed. The framework of related components proposed in this paper is an attempt to provide exactly that. It includes a meta-model and supporting tools for modeling the knowledge that reverse engineers acquire as they execute their strategies, a meta-model to estimate the required effort of those strategies, and tools to capture strategic activities from data streams collected during human reverse engineering experiments. Their use is demonstrated on three example reverse engineering strategies.

Original languageEnglish (US)
Title of host publicationCheckMATE 2024 - Proceedings of the 2024 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) attacks, Co-Located with
Subtitle of host publicationCCS 2024
PublisherAssociation for Computing Machinery, Inc
Pages44-58
Number of pages15
ISBN (Electronic)9798400712302
DOIs
StatePublished - Nov 19 2024
Event2024 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) attacks, CheckMATE 2024, held as part of the ACM Conference on Computer and Communications Security, CCS 2024 - Salt Lake City, United States
Duration: Oct 14 2024Oct 18 2024

Publication series

NameCheckMATE 2024 - Proceedings of the 2024 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) attacks, Co-Located with: CCS 2024

Conference

Conference2024 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) attacks, CheckMATE 2024, held as part of the ACM Conference on Computer and Communications Security, CCS 2024
Country/TerritoryUnited States
CitySalt Lake City
Period10/14/2410/18/24

Keywords

  • reverse engineering
  • strategy modeling, simulation, and capturing

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Software

Fingerprint

Dive into the research topics of 'Tools and Models for Software Reverse Engineering Research'. Together they form a unique fingerprint.

Cite this