Reversing to detect software vulnerabilities
Security is a real concern for the society and it is not different for software. Vulnerable applications can expose the users to multiple risks. Software disassembling is an interesting approach to discover vulnerabilities. Unmounting an application into Assembly code can reveal multiple characteris...
Saved in:
| Published in: | 2017 12th Iberian Conference on Information Systems and Technologies (CISTI) pp. 1 - 6 |
|---|---|
| Main Authors: | , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
AISTI
01.06.2017
|
| Subjects: | |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Security is a real concern for the society and it is not different for software. Vulnerable applications can expose the users to multiple risks. Software disassembling is an interesting approach to discover vulnerabilities. Unmounting an application into Assembly code can reveal multiple characteristics from the software. During the disassembling, technical features can be revealed that enable the researcher to discover issues even with no source-code available. The paper has the goal of demonstratingSecurity is a real concern for the society and it is not different for software. Vulnerable applications can expose the users to multiple risks. Software disassembling is an interesting approach to discover vulnerabilities. Unmounting an application into Assembly code can reveal multiple characteristics from the software. During the disassembling, technical features can be revealed that enable the researcher to discover issues even with no source-code available. The paper has the goal of demonstrating the disassembling efficacy for detecting vulnerabilities on software and presents a case study to evaluate the concept. the disassembling efficacy for detecting vulnerabilities on software and presents a case study to evaluate the concept. |
|---|---|
| DOI: | 10.23919/CISTI.2017.7975746 |