• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/8

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

8 Cards in this Set

  • Front
  • Back
The process of extracting the knowledge or design blueprints from anything man-made.
Reverse engineering

LG-1.1 – Define Reverse Engineering (A) [Slide #7, Eilam P. 3]
To obtain missing knowledge, ideas, and design philosophy when such information is unavailable. In some cases, the information is owned by someone who isn’t willing to share them. In other cases, the information has been lost or destroyed.
Reverse engineering is usually conducted

LG-1.2 – Identify when reverse engineering is conducted (A) [Slide #8, Eilam P. 3-4]
This category of reversing is Used by malware developers, security software developers, crackers, and for encryption research.
Security-related

LG-1.3 – Distinguish between the different categories of reverse engineering (B) [Slide #9-22, Eilam P. 5-9]
This category of reversing deals with Malicious Software;
Reversing is used extensively in both ends of the malicious software chain. Developers of malicious software often use reversing to locate vulnerabilities in operating systems and other software.
Security-related

LG-1.3 – Distinguish between the different categories of reverse engineering (B) [Slide #9-22, Eilam P. 5-9]
This category of reversing deals with Reversing Cryptographic Algorithms;
Restricted algorithms are the kind some kids play with; writing a letter to a friend with each letter shifted several letters up or down. The secret in restricted algorithms is the
algorithm itself.
Security-related

LG-1.3 – Distinguish between the different categories of reverse engineering (B) [Slide #9-22, Eilam P. 5-9]
This category of reversing Digital Rights Management;
This topic is highly related to reverse engineering because crackers routinely use reverse-engineering techniques while attempting to defeat DRM technologies. The reason for this is that to defeat a DRM technology one must understand how it works.
Security-related

LG-1.3 – Distinguish between the different categories of reverse engineering (B) [Slide #9-22, Eilam P. 5-9]
This category of reversing deals with Auditing Program Binaries; With open-source software, having open access to the program’s source code means that certain vulnerabilities and security holes can be discovered very early on, often before malicious programs can take advantage of them.
Security-related

LG-1.3 – Distinguish between the different categories of reverse engineering (B) [Slide #9-22, Eilam P. 5-9]
This category of reversing can be incredibly useful to software developers to achieve interoperability, develop competing software and to evaluate quality and robustness. Reversing can be incredibly useful to software developers to achieve interoperability, develop competing software and to evaluate quality and robustness.
Software development–related

LG-1.3 – Distinguish between the different categories of reverse engineering (B) [Slide #9-22, Eilam P. 5-9]