DocumentCode
3699313
Title
Beat your mom at solitaire — A review of reverse engineering techniques and countermeasures
Author
Christoph Matthies;Lukas Pirl;Amir Azodi;Christoph Meinel
Author_Institution
Hasso Plattner Institute (HPI), University of Potsdam, Chair of Internet Technologies and Systems, Prof.-Dr.-Helmert-Straß
fYear
2015
Firstpage
1094
Lastpage
1097
Abstract
As computer software systems grow ever more sophisticated, so do the mechanisms used in compromising them. Some of the most advanced cyber attacks in recent years would have required considerable preparation and research on the specific software applications and the hardware they targeted. In this paper we focus on native applications and evaluate different reverse engineering techniques with a focus on memory manipulation, used to compromise their security. Additionally we discuss different protection mechanism and their practicalities. The techniques discussed are executed against a well known application (i.e. the Microsoft Windows Solitaire game) and the results are presented.
Keywords
"Games","Software","Reverse engineering","Data structures","Memory management","Servers","Computers"
Publisher
ieee
Conference_Titel
Software Engineering and Service Science (ICSESS), 2015 6th IEEE International Conference on
ISSN
2327-0586
Print_ISBN
978-1-4799-8352-0
Electronic_ISBN
2327-0594
Type
conf
DOI
10.1109/ICSESS.2015.7339242
Filename
7339242
Link To Document