DocumentCode :
3699313
Title :
Beat your mom at solitaire — A review of reverse engineering techniques and countermeasures
Author :
Christoph Matthies;Lukas Pirl;Amir Azodi;Christoph Meinel
Author_Institution :
Hasso Plattner Institute (HPI), University of Potsdam, Chair of Internet Technologies and Systems, Prof.-Dr.-Helmert-Straß
fYear :
2015
Firstpage :
1094
Lastpage :
1097
Abstract :
As computer software systems grow ever more sophisticated, so do the mechanisms used in compromising them. Some of the most advanced cyber attacks in recent years would have required considerable preparation and research on the specific software applications and the hardware they targeted. In this paper we focus on native applications and evaluate different reverse engineering techniques with a focus on memory manipulation, used to compromise their security. Additionally we discuss different protection mechanism and their practicalities. The techniques discussed are executed against a well known application (i.e. the Microsoft Windows Solitaire game) and the results are presented.
Keywords :
"Games","Software","Reverse engineering","Data structures","Memory management","Servers","Computers"
Publisher :
ieee
Conference_Titel :
Software Engineering and Service Science (ICSESS), 2015 6th IEEE International Conference on
ISSN :
2327-0586
Print_ISBN :
978-1-4799-8352-0
Electronic_ISBN :
2327-0594
Type :
conf
DOI :
10.1109/ICSESS.2015.7339242
Filename :
7339242
Link To Document :
بازگشت