Proceedings of the 38th Annual Computer Security Applications Conference 2022
DOI: 10.1145/3564625.3567993
|View full text |Cite
|
Sign up to set email alerts
|

A Qualitative Evaluation of Reverse Engineering Tool Usability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 29 publications
0
1
0
Order By: Relevance
“…The results of both are consistent in terms of the number of 'BL' instructions and the corresponding addresses. With the addresses obtained of all 'BL' instructions, combined with professional reverse engineering tools (e.g., IDA Pro or Ghidra [14] ), it is convenient to reverse engineer all the library functions invoked within the firmware. By doing so, attackers can more quickly locate the related function instructions or critical data that can be exploited for attacks.…”
Section: Discussionmentioning
confidence: 99%
“…The results of both are consistent in terms of the number of 'BL' instructions and the corresponding addresses. With the addresses obtained of all 'BL' instructions, combined with professional reverse engineering tools (e.g., IDA Pro or Ghidra [14] ), it is convenient to reverse engineer all the library functions invoked within the firmware. By doing so, attackers can more quickly locate the related function instructions or critical data that can be exploited for attacks.…”
Section: Discussionmentioning
confidence: 99%