Software Reverse Engineering
Assignment 1: Review of Reverse Engineering Methodologies
• Discuss the use of software reverse engineering techniques as a component of incident response.
• Describe the role of automation in software reverse engineering.
• Describe the role of static and dynamic analysis in the examination of unknown binaries.
• Compare different types of obfuscation and deobfuscation techniques in common use.
Prepare a report which compares and contrasts three (3) software tools commonly used in software reverse engineering and malware analysis. These can include disassemblers, binary management frameworks, sandbox platforms, or other utilities.
In your report must explain how each tool is used, how it relates to software reverse engineering/malware analysis, what unique functionality it provides, its strengths, and weaknesses. In your report must address the roles of static and dynamic analysis, automation, and obfuscation in software reverse engineering.
Your report must be between 2000 and 4000 words, excluding references, table of contents, cover page, etc.
Structure and Marking Guide
This assignment is worth a total of 20 marks, which are distributed as shown below:
Appropriate selection and justification of software tools 3
Appropriate description of each software tool 5
Examination of strengths and weaknesses of each software tool 6
Discussion of static/dynamic analysis, automation and obfuscation 5
When marking your work, the depth of research, coherency of argument and quality of writing will be considered as the primary requirements.
All work submitted must comply with Curtin University referencing and academic misconduct policies