Intro To Reverse Engineering

Lecture Notes

Introduction to Reverse Engineering, the objectives, scope and relevant concepts.

Download here

References

The following papers provide a through insight towards reverse engineering tasks, activities and scope, as well as some interesting examples.

  • E. J. Chikofsky and J. H. Cross, “Reverse engineering and design recovery: a taxonomy,” in IEEE Software, vol. 7, no. 1, pp. 13-17, Jan. 1990, doi: 10.1109/52.43044., Reverse engineering and design recovery: a taxonomy | IEEE Journals & Magazine | IEEE Xplore
  • Jens de Hoog, Toon Bogaerts, Wim Casteels, Siegfried Mercelis, Peter Hellinckx,Online reverse engineering of CAN data, Internet of Things, Volume 11, 2020, 100232, ISSN 2542-6605, https://doi.org/10.1016/j.iot.2020.100232.
  • Ziadia, M.; Fattahi, J.; Mejri, M.; Pricop, E. Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android Applications. Information 2020, 11, 130. https://doi.org/10.3390/info11030130
  • G. Kim, M. Ma and I. Park, “A fast and flexible software for IC reverse engineering,” 2018 International Conference on Electronics, Information, and Communication (ICEIC), Honolulu, HI, USA, 2018, pp. 1-4, doi: 10.23919/ELINFOCOM.2018.8330639.
  • With a broader scope, but as mandatory reading for the curious mind, also check the great works at PoC||GTFO: https://pocorgtfo.hacke.rs/
Previous
Next