Reverse Engineering for Fun and BoF It!

Presented at ShmooCon I (2005), Feb. 5, 2005, 4 p.m. (60 minutes).

Reverse engineering skills can come in handy in any number of situations. Determining the behavior of malware, interoperability with closed source applications, and discovery of software vulnerabilities are just a few of the situations in which reverse engineering skills can come in handy. Unfortunately reverse engineers often seem to be self trained and open forums for discussing tools and techniques seem to be few and far between. This goal of this session is to hear people talk about tools and techniques employed for various reverse engineering tasks.

We'll talk about current tools of the trade, disassemblers, debuggers, fuzzers and such. Without turning into a religious battle, the relative merits of various approaches to reverse engineering techniques including static and dynamic analysis of closed source code may also be discussed. And, finally, we will discuss how to deal with the latest trends in anti-reverse engineering techniques with a potential look at the strengths and weaknesses of techniques introduced in the preceding talk by Pusscat: http://www.shmoocon.org/program.html#pusscat


Presenters:

  • Chris Eagle - Associate Chair, Computer Science, Naval Postgraduate School
    Chris Eagle is the Associate Chairman of the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, CA. A computer engineer/scientist for 19 years, his research interests include computer network operations, computer forensics and reverse/anti-reverse engineering.

Links:

Similar Presentations: