Skip to main content

Flexible Reverse Engineering of Desktop and Web Applications

  • Conference paper
  • First Online:
Computational Intelligence for Engineering and Management Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 984))

  • 344 Accesses

Abstract

The day-to-day increase in the number of cyber-criminal activities raises the demand for strengthening and refining our computer security systems. Reverse engineering plays a decisive role in upholding essential security standards. The method of reverse engineering was formerly applied to hardware, but currently, it is also being applied on software applications, databases and, even in the domain of natural sciences. In cybersecurity, reverse engineering enables the finding of the breach details attempted by the attacker. This additionally helps in the detection of bugs, vulnerabilities and loopholes present in the software application and thereby solidifying the security aspects of the application. This paper discusses the various application of reverse engineering in the field of cybersecurity, appropriate tools for its implementation and practical demonstration of reverse engineering a software application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Treude C, Figueira Filho F, Storey MA, Salois M (2011) An exploratory study of software reverse engineering in a security context. In: Working conference on reverse engineering, pp 184–188

    Google Scholar 

  2. Thankappan J, Patil V (2015) Detection of web design patterns using reverse engineering. In: Second international conference on advances in computing and communication engineering, pp 697–701

    Google Scholar 

  3. Alalfi MH, Cordy JR, Dean TR (2009) Automated reverse engineering of UML sequence diagrams for dynamic web applications. In: International conference on software testing, verification, and validation workshops, pp 287–294

    Google Scholar 

  4. Kumar M (2017) Reverse engineering and vulnerability analysis in cyber security. Int J Adv Res Comput Sci

    Google Scholar 

  5. Tramontana P (2005) Reverse engineering web applications. In: International conference on software maintenance, pp 705–708

    Google Scholar 

  6. Cloutier J, Kpodjedo S, El Boussaidi G (2016) WAVI: a reverse engineering tool for web applications. In: International conference on program comprehension

    Google Scholar 

  7. Tramontana P, Amalfitano D, Fasolino AR (2013) Reverse engineering techniques: from web applications to rich Internet applications. In: IEEE International symposium on web systems evolution (WSE) pp 83–86

    Google Scholar 

  8. Xu H, Zhou Y, Lyu M (2016) N-version obfuscation. In: International workshop on cyber-physical system security, pp 22–33

    Google Scholar 

  9. Di Lucca GA, Di Penta M, Antoniol G, Casazza G (2001) An approach for reverse engineering of web-based applications. In: Working conference on reverse engineering, pp 231–240

    Google Scholar 

  10. Mercier D, Chawdhary A, Jones R (2017) dynStruct: an automatic reverse engineering tool for structure recovery and memory use analysis. In: International conference on software analysis, evolution and reengineering, pp 497–501

    Google Scholar 

  11. Decker MJ, Swartz K, Collard ML, Maletic JI. A tool for efficiently reverse engineering accurate UML class diagrams, International Conference on Software Maintenance and Evolution (2016) 607–609

    Google Scholar 

  12. Pathak N, Sharma G, Singh BM (2017) Towards designing of SPF based secure web application using UML 2.0. Int J Syst Assur Eng Manag, pp 208–218

    Google Scholar 

  13. Bellettini C, Marchetto A, Trentini A (2004) WebUml: reverse engineering of web applications. In: Proceedings of the 2004 ACM symposium on applied computing, pp 1662–1669

    Google Scholar 

  14. Jung YK, Chang K, Park SH, Ho VT, Shim HJ, Kim MW (2021) Reverse engineering and database of off-the-shelf propellers for middle-size multirotors. Unmanned Syst, pp 321–332

    Google Scholar 

  15. Oh SJ, Schiele B, Fritz M (2019) Towards reverse-engineering black-box neural networks. In: Explainable AI: interpreting, explaining and visualizing deep learning, pp 21–144

    Google Scholar 

  16. Sabharwal S, Sharma S (2020) Ransomware attack: India issues red alert. In: Emerging technology in modelling and graphics, pp 471–484

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shilpi Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, S., Vashisth, S., Dhall, I. (2023). Flexible Reverse Engineering of Desktop and Web Applications. In: Chatterjee, P., Pamucar, D., Yazdani, M., Panchal, D. (eds) Computational Intelligence for Engineering and Management Applications. Lecture Notes in Electrical Engineering, vol 984. Springer, Singapore. https://doi.org/10.1007/978-981-19-8493-8_45

Download citation

Publish with us

Policies and ethics