We use existing tools and techniques to derive ways of quickly identifying how applications are constructed, the functions that they use and how they use them. Following this high-level reverse engineering, the researcher is then free to take further steps at reversing specific functions with the more traditional lower-level binary analysis.
Download the paper in PDF format here.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.