Software Reverse Engineering Assignment: Review of Reverse Engineering Methodologies
Learning Outcomes
- Discuss the use of software reverse engineering techniques as a component of incident response.
- Describe the role of automation in software reverse engineering.
- Describe the role of static and dynamic analysis in the examination of unknown binaries.
- Compare different types of obfuscation and deobfuscation techniques in common use.
Assignment Brief
Prepare a report which compares and contrasts three (3) software tools commonly used in software reverse engineering and malware analysis. These can include dis-assemblers, binary management frameworks, sandbox platforms, or other utilities.
In your report must explain how each tool is used, how it relates to software reverse engineering/malware analysis, what unique functionality it provides, its strengths, and weaknesses. In your report must address the roles of static and dynamic analysis, automation, and obfuscation in software reverse engineering.
Your report must be between 2000 and 4000 words, excluding references, table of contents, cover page, etc.