Abstract
Reverse engineering is the filthy end of the security industry; it is the business of extracting information from a program when the source is unavailable. Reversing is often necessary when performing a security audit on a product that relies on third-party software such as a library. Security engineers also reverse to reason about the latest malicious programs and devise antivirus software. Security engineers (and malicious hackers) do not attempt to reverse assembler into, say C, which is the traditional aspiration in reversing, but merely to understand the code to sufficient depth to locate a vulnerability.
Chapter PDF
References
Balakrishnan, G.: WYSINWYX: What You See Is Not What You eXecute. Ph.D thesis, Computer Sciences Department, University of Wisconsin, Madison (2007)
Kinder, J., Veith, H., Zuleger, F.: An abstract interpretation-based framework for control flow reconstruction from binaries. In: Muller-Olm, M. (ed.) VMCAI 2009. LNCS, vol. 5403, pp. 214–228. Springer, Heidelberg (2009)
King, A., Søndergaard, H.: Inferring Congruence Equations using SAT. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 281–293. Springer, Heidelberg (2008)
Pennell, J.: Reverse Engineering with IDA Pro. IOActive (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
King, A. (2009). Untangling Reverse Engineering with Logic and Abstraction. In: Hill, P.M., Warren, D.S. (eds) Logic Programming. ICLP 2009. Lecture Notes in Computer Science, vol 5649. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02846-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-02846-5_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02845-8
Online ISBN: 978-3-642-02846-5
eBook Packages: Computer ScienceComputer Science (R0)