Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/109371
Citations
Scopus Web of ScienceĀ® Altmetric
?
?
Full metadata record
DC FieldValueLanguage
dc.contributor.authorCleary, B.-
dc.contributor.authorTreude, C.-
dc.contributor.authorFilho, F.-
dc.contributor.authorStorey, M.-
dc.contributor.authorSalois, M.-
dc.contributor.editorSchmorrow, D.-
dc.contributor.editorFidopiastis, C.-
dc.date.issued2013-
dc.identifier.citationLecture Notes in Artificial Intelligence, 2013 / Schmorrow, D., Fidopiastis, C. (ed./s), vol.8027 LNAI, pp.113-122-
dc.identifier.isbn9783642394539-
dc.identifier.issn0302-9743-
dc.identifier.issn1611-3349-
dc.identifier.urihttp://hdl.handle.net/2440/109371-
dc.descriptionLNCS, volume 8027-
dc.description.abstractIllegal cyberspace activities are increasing rapidly and many software engineers are using reverse engineering methods to respond to attacks. The security-sensitive nature of these tasks, such as the understanding of malware or the decryption of encrypted content, brings unique challenges to reverse engineering: work has to be done offline, files can rarely be shared, time pressure is immense, and there is a lack of tool and process support for capturing and sharing the knowledge obtained while trying to understand assembly code. To help us gain an understanding of this reverse engineering work, we conducted an exploratory study at a government research and development organization to explore their work processes, tools, and artifacts [1]. We have been using these findings to improve visualization and collaboration features in assembly reverse engineering tools. In this talk, we will present a review of the findings from our study, and present prototypes we have developed to improve capturing and sharing knowledge while analyzing security concerns.-
dc.description.statementofresponsibilityBrendan Cleary, Christoph Treude, Fernando Figueira Filho, Margaret-Anne Storey, and Martin Salois-
dc.language.isoen-
dc.publisherSpringer-
dc.relation.ispartofseriesLecture Notes in Computer Science-
dc.rightsSpringer-Verlag Berlin Heidelberg 2013-
dc.source.urihttp://dx.doi.org/10.1007/978-3-642-39454-6-
dc.subjectMalware; reverse engineering; empirical study.-
dc.titleImproving tool support for software reverse engineering in a security context-
dc.typeConference paper-
dc.contributor.conferenceInternational Conference on Augmented Cognition (21 Jul 2013 - 26 Jul 2013 : Las Vegas, NV)-
dc.identifier.doi10.1007/978-3-642-39454-6_12-
pubs.publication-statusPublished-
dc.identifier.orcidTreude, C. [0000-0002-6919-2149]-
Appears in Collections:Aurora harvest 3
Computer Science publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.