Reverse Engineering
Reverse Engineering
Our Process
Our method leverages state-of-the-art program binary analysis tools to extract descriptive program info from an executable software. Using a reverse engineering method our SMEs will be able to highlight the entry point of a program and show the assembly code and corresponding human-readable code (for instance) for each function. Furthermore, the list of string literals included in the program could be derived as a separate list. When such descriptive information is extracted, we will use semi-automated code review and instrumentations to detect sensitive code snippets, as well as inclusion of libraries with known vulnerabilities (CVEs). We will automatically discover classes and modules that include architectural solutions as well as implement disruptive changes that may introduce design flaws, technical debts, architectural smells for the project and/or increase the total cost of the maintenance effort.
Location
ESL Global Cybersecurity Institute
Our state-of-the-art Cyber Range and Training Center, located at the ESL Global Cybersecurity Institute on RIT’s campus in Rochester, NY. It is capable of hosting more than 5,000 virtual machines simultaneously in immersive scenarios, enabling Executive Incident Response Training, Threat Intelligence and Emulation Training, and more.
Within this infrastructure, we are able to introduce threat intelligence systems in scale replicas of any massive, global business, with specific focus on healthcare, energy, and finance. The Cyber Range and Training Center provides alternate reality instructional vignettes for cohorts of corporate leaders and IT security professionals to experiment and learn, facilitating research opportunities in the most critical of industries.