350 rub
Journal Science Intensive Technologies №8 for 2015 г.
Article in number:
Application of reverse engineering for malicious code and undocumented software features
Authors:
I.E. Vanak - Student, Department 402, Moscow Aviation Institute (MAI). E-mail: iciva@mail.ru
Abstract:
The article is devoted to the development and application of a technique a reverse engineering on the example of the solution of a competitive task from Kaspersky Lab. A reverse-engineering [1] is an important and often the only available method for the devel-opment and creation special software. It allows analyzing security of system from external invasion that is the extremely important during the work with aviation and space systems, because the loss in those systems due to the undeclared capabilities [2] could be catastrophic. It describes the procedure for obtaining information about the algorithms of the program and uses this information to achieve a particular result - receiving one of the valid secure crypto pair. The focus is on analysis of disassembled code [3] to obtain comprehensive information about the working methods of the research object. Also, focuses on the analysis of cryptographic algorithms, the decryption process is shown. On the example of the sorted program practical experience a reverse engineering is generalized.
Pages: 6-12
References

 

  1. Chikofsky E.J., Cross J.H. Reverse Engineering and Design Recovery: A Taxonomy // IEEE Software 1990. № 7(1). P. 13−17.
  2. Prikaz predsedatelja Gostekhkomissii Rossii ot 4 ijunja 1999 g. № 114 (s obnovleniem ot 1.12.2014), chast 1, punkt 2.
  3. Kris Kasperski, Eva Rokko Iskusstvo dizassemblirovanija. SPb.: BKHV-Peterburg. 2008. 896 s.
  4. Dis. Issledovanie i razrabotka metodov dekompiljacii programm kand. tekhn. nauk Troshinojj E.N. M.: 2009.
  5. Dolgova K.N., CHernov A.V. O nekotorykh zadachakh obratnojj inzhenerii // Trudy Instituta sistemnogo programmirovanija RAN. 2008. № 15.
  6. Markus, László & John. UPX [EHlektronnyjj resurs] / John F. Reiser 2000−2013. Rezhim dostupa: http://upx.sourceforge.net/, svobodnyjj. Data obrashhenija k resursu 01.06.2015.
  7. Denis JUrichevReverseEngineering dlja nachinajushhikh, 2015 g. [EHlektronnyjj resurs] / EHlektron. tekst. dannye. 2015. Rezhim dostupa: http://beginners.re/Reverse_Engineering_for_Beginners-ru.pdf, svobodnyjj. Data obrashhenija k resursu 07.06.2015.
  8. ZHurnal «KHaker».2014. № 188. S. 208−217.
  9. NOU «INTUIT». Kriptograficheskie osnovy bezopasnosti. Lekcija 7. Kriptografija s otkrytym kljuchom [EHlektronnyjj resurs] / EHlektron.tekst.dannye. 2015. Rezhim dostupa: http://www.intuit.ru/studies/courses/28/28/lecture/20422-page=2, svobodnyjj. Data obrashhenija k resursu 01.06.2015.
  10. Hanewinkel, Herbert. AES (Rijndael) Encryption Test in JavaScript [EHlektronnyjjresurs]. JavaScriptGermany: [b.i.], 2005. Rezhim dostupa: http://www.hanewin.net/encrypt/aes/aes-test.htm, svobodnyjj. Data obrashhenija k resursu 01.06.2015.