Software Reverse Engineering
The intent of the Software Reverse Engineering Knowledge Unit is to provide students with the capability to perform reverse engineering of executable code to determine its function and effects, or to discover details of the implementation.
- Malware Analysis
- Reverse Engineering Tools & Techniques
- Anti-reverse engineering techniques
- Students should be able to use common software reverse engineering tools to safely perform static and dynamic analysis of software (or malware) of unknown origin for the purposes of understanding the software functionality and implementation.
Below are the Knowledge, Skills, Abilities and Tasks (KSA-T) identified as being required to perform this work role.
Learn More about the KAS-T's.
||Knowledge of malware analysis concepts and methodologies.
||Knowledge of cyber defense and vulnerability assessment tools and their capabilities.
||Knowledge of systems diagnostic tools and fault identification techniques.
||Skill of identifying, capturing, containing, and reporting malware.
||Skill in analyzing malware.
||Skill in reverse engineering (e.g., hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote tools.
||Skill in using binary analysis tools (e.g., Hexedit, command code xxd, hexdump).