Reverse Engineering

Our engineering tools are used to disassemble an application binary to derive its assembly code and then decompile the assembly code to derive a human-readable code.

Our Process

Silhouette of a person using a laptop while standing.

Our method leverages state-of-the-art program binary analysis tools to extract descriptive program info from an executable software. Using a reverse engineering method our SMEs  will be able to highlight the entry point of a program and show the assembly code and corresponding human-readable code (for instance) for each function. Furthermore, the list of string literals included in the program could be derived as a separate list. When such descriptive information is extracted, we will use semi-automated code review and instrumentations to detect sensitive code snippets, as well as inclusion of libraries with known vulnerabilities (CVEs).  We will automatically discover classes and modules that include architectural solutions as well as implement disruptive changes that may introduce design flaws, technical debts, architectural smells for the project and/or increase the total cost of the maintenance effort.

What You’ll Receive

Outcome will include a program tree to navigate to certain sections of the assembly code within the program, and a symbol tree to list included imports, exports, functions, labels, classes and name spaces.

Location

exterior view of the GCI building in the evening.

ESL Global Cybersecurity Institute

Our state-of-the-art Cyber Range and Training Center, located at the ESL Global Cybersecurity Institute on RIT’s campus in Rochester, NY. It is capable of hosting more than 5,000 virtual machines simultaneously in immersive scenarios, enabling Executive Incident Response Training, Threat Intelligence and Emulation Training, and more.

Within this infrastructure, we are able to introduce threat intelligence systems in scale replicas of any massive, global business, with specific focus on healthcare, energy, and finance. The Cyber Range and Training Center provides alternate reality instructional vignettes for cohorts of corporate leaders and IT security professionals to experiment and learn, facilitating research opportunities in the most critical of industries.

Book Now

Contact Sarah Yarger to book your training and learn more!

Sarah Yarger
Sarah Yarger
Project and Operations Manager