• DocumentCode
    3699313
  • Title

    Beat your mom at solitaire — A review of reverse engineering techniques and countermeasures

  • Author

    Christoph Matthies;Lukas Pirl;Amir Azodi;Christoph Meinel

  • Author_Institution
    Hasso Plattner Institute (HPI), University of Potsdam, Chair of Internet Technologies and Systems, Prof.-Dr.-Helmert-Straß
  • fYear
    2015
  • Firstpage
    1094
  • Lastpage
    1097
  • Abstract
    As computer software systems grow ever more sophisticated, so do the mechanisms used in compromising them. Some of the most advanced cyber attacks in recent years would have required considerable preparation and research on the specific software applications and the hardware they targeted. In this paper we focus on native applications and evaluate different reverse engineering techniques with a focus on memory manipulation, used to compromise their security. Additionally we discuss different protection mechanism and their practicalities. The techniques discussed are executed against a well known application (i.e. the Microsoft Windows Solitaire game) and the results are presented.
  • Keywords
    "Games","Software","Reverse engineering","Data structures","Memory management","Servers","Computers"
  • Publisher
    ieee
  • Conference_Titel
    Software Engineering and Service Science (ICSESS), 2015 6th IEEE International Conference on
  • ISSN
    2327-0586
  • Print_ISBN
    978-1-4799-8352-0
  • Electronic_ISBN
    2327-0594
  • Type

    conf

  • DOI
    10.1109/ICSESS.2015.7339242
  • Filename
    7339242