Software Reverse Engineering
The intent of the Software Reverse Engineering Knowledge Unit is to provide students with the capability to perform reverse engineering of executable code to determine its function and effects, or to discover details of the implementation.
- Malware Analysis
- Reverse Engineering Tools & Techniques
- Anti-reverse engineering techniques
- Students should be able to use common software reverse engineering tools to safely perform static and dynamic analysis of software (or malware) of unknown origin for the purposes of understanding the software functionality and implementation.
Below are the Knowledge, Skills, Abilities and Tasks (KSA-T) identified as being required to perform this work role.
Learn More about the KAS-T's.
||Knowledge of reverse engineering concepts.
||Knowledge of debugging procedures and tools.
||Knowledge of malware analysis tools (e.g., Oily Debug, Ida Pro).
||Knowledge of malware with virtual machine detection (e.g. virtual aware malware, debugger aware malware, and unpacked malware that looks for VM-related strings in your computer??s display device).
||Knowledge of malware analysis concepts and methodologies.
||Knowledge of malware analysis and characteristics.
||Knowledge of cyber defense and vulnerability assessment tools and their capabilities.
||Knowledge of hardware reverse engineering techniques.
||Knowledge of software reverse engineering techniques.
||Knowledge of binary analysis.
||Knowledge of systems diagnostic tools and fault identification techniques.
||Skill of identifying, capturing, containing, and reporting malware.
||Skill in reverse engineering (e.g., hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote tools.
||Skill in analyzing malware.
||Skill in applying the systems engineering process.
||Skill in using binary analysis tools (e.g., Hexedit, command code xxd, hexdump).