Reverse engineering is a process in which we try to discover the details of software, while we do not have access to its source code. In the diploma thesis we present reverse engineering process on Microsoft Windows operating system. First, we describe PE format and structure of x86 assembler. Then we describe tools, which are used in process of reverse engineering. The focus is on debuggers, dissasemblers and system monitors. We describe functionality of such tools to detect and thwart reverse engineering process. We focus on the use of junk and self-modifying code, since the goal of the thesis was to develope a tool, which will use these methods to code and decode machine instructions. Finaly, we describe the use of the tool, its weakness...
Tehnike zaštite programskog koda se koriste iz različitih razloga. Neki od razloga korištenja mogu b...
Reverse engineering of executable programs, by disassembling them and then using program analyses to...
The number of real-time computer systems in which embedded software has been used has dramatically i...
This thesis describes procedures and tools of reverse engineering in terms of software development. ...
Focus of this thesis is reverse engineering in information technology closely linked with the malwar...
Celem pracy magisterskiej jest opisanie metod służących do przeciwdziałania ewentualnym prób...
Illegal cyberspace activities are increasing rapidly and many software engineers are using reverse e...
Reverse engineering of software binary codes have reached an advanced state that can be effectively ...
Reverse engineering is the process of recovering a high level structure and its semantics from a low...
This thesis presents a literature review of current reverse engineering technologies and processes, ...
In dieser Arbeit soll die praktische Eignung des Reverse Engineering von Software untersucht werden....
As the 20th century draws to a close, software has become one of the major driving forces in busines...
Software often contains proprietary information --- algorithms, intellectual property, and encryptio...
U ovom radu opisane su metode zaštite programskog koda od reverznog inženjerstva s primjerima u prog...
Reverse engineering of executable programs, by disassembling them and then using program analyses t...
Tehnike zaštite programskog koda se koriste iz različitih razloga. Neki od razloga korištenja mogu b...
Reverse engineering of executable programs, by disassembling them and then using program analyses to...
The number of real-time computer systems in which embedded software has been used has dramatically i...
This thesis describes procedures and tools of reverse engineering in terms of software development. ...
Focus of this thesis is reverse engineering in information technology closely linked with the malwar...
Celem pracy magisterskiej jest opisanie metod służących do przeciwdziałania ewentualnym prób...
Illegal cyberspace activities are increasing rapidly and many software engineers are using reverse e...
Reverse engineering of software binary codes have reached an advanced state that can be effectively ...
Reverse engineering is the process of recovering a high level structure and its semantics from a low...
This thesis presents a literature review of current reverse engineering technologies and processes, ...
In dieser Arbeit soll die praktische Eignung des Reverse Engineering von Software untersucht werden....
As the 20th century draws to a close, software has become one of the major driving forces in busines...
Software often contains proprietary information --- algorithms, intellectual property, and encryptio...
U ovom radu opisane su metode zaštite programskog koda od reverznog inženjerstva s primjerima u prog...
Reverse engineering of executable programs, by disassembling them and then using program analyses t...
Tehnike zaštite programskog koda se koriste iz različitih razloga. Neki od razloga korištenja mogu b...
Reverse engineering of executable programs, by disassembling them and then using program analyses to...
The number of real-time computer systems in which embedded software has been used has dramatically i...