Abstract
The day-to-day increase in the number of cyber-criminal activities raises the demand for strengthening and refining our computer security systems. Reverse engineering plays a decisive role in upholding essential security standards. The method of reverse engineering was formerly applied to hardware, but currently, it is also being applied on software applications, databases and, even in the domain of natural sciences. In cybersecurity, reverse engineering enables the finding of the breach details attempted by the attacker. This additionally helps in the detection of bugs, vulnerabilities and loopholes present in the software application and thereby solidifying the security aspects of the application. This paper discusses the various application of reverse engineering in the field of cybersecurity, appropriate tools for its implementation and practical demonstration of reverse engineering a software application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Treude C, Figueira Filho F, Storey MA, Salois M (2011) An exploratory study of software reverse engineering in a security context. In: Working conference on reverse engineering, pp 184–188
Thankappan J, Patil V (2015) Detection of web design patterns using reverse engineering. In: Second international conference on advances in computing and communication engineering, pp 697–701
Alalfi MH, Cordy JR, Dean TR (2009) Automated reverse engineering of UML sequence diagrams for dynamic web applications. In: International conference on software testing, verification, and validation workshops, pp 287–294
Kumar M (2017) Reverse engineering and vulnerability analysis in cyber security. Int J Adv Res Comput Sci
Tramontana P (2005) Reverse engineering web applications. In: International conference on software maintenance, pp 705–708
Cloutier J, Kpodjedo S, El Boussaidi G (2016) WAVI: a reverse engineering tool for web applications. In: International conference on program comprehension
Tramontana P, Amalfitano D, Fasolino AR (2013) Reverse engineering techniques: from web applications to rich Internet applications. In: IEEE International symposium on web systems evolution (WSE) pp 83–86
Xu H, Zhou Y, Lyu M (2016) N-version obfuscation. In: International workshop on cyber-physical system security, pp 22–33
Di Lucca GA, Di Penta M, Antoniol G, Casazza G (2001) An approach for reverse engineering of web-based applications. In: Working conference on reverse engineering, pp 231–240
Mercier D, Chawdhary A, Jones R (2017) dynStruct: an automatic reverse engineering tool for structure recovery and memory use analysis. In: International conference on software analysis, evolution and reengineering, pp 497–501
Decker MJ, Swartz K, Collard ML, Maletic JI. A tool for efficiently reverse engineering accurate UML class diagrams, International Conference on Software Maintenance and Evolution (2016) 607–609
Pathak N, Sharma G, Singh BM (2017) Towards designing of SPF based secure web application using UML 2.0. Int J Syst Assur Eng Manag, pp 208–218
Bellettini C, Marchetto A, Trentini A (2004) WebUml: reverse engineering of web applications. In: Proceedings of the 2004 ACM symposium on applied computing, pp 1662–1669
Jung YK, Chang K, Park SH, Ho VT, Shim HJ, Kim MW (2021) Reverse engineering and database of off-the-shelf propellers for middle-size multirotors. Unmanned Syst, pp 321–332
Oh SJ, Schiele B, Fritz M (2019) Towards reverse-engineering black-box neural networks. In: Explainable AI: interpreting, explaining and visualizing deep learning, pp 21–144
Sabharwal S, Sharma S (2020) Ransomware attack: India issues red alert. In: Emerging technology in modelling and graphics, pp 471–484
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, S., Vashisth, S., Dhall, I. (2023). Flexible Reverse Engineering of Desktop and Web Applications. In: Chatterjee, P., Pamucar, D., Yazdani, M., Panchal, D. (eds) Computational Intelligence for Engineering and Management Applications. Lecture Notes in Electrical Engineering, vol 984. Springer, Singapore. https://doi.org/10.1007/978-981-19-8493-8_45
Download citation
DOI: https://doi.org/10.1007/978-981-19-8493-8_45
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-8492-1
Online ISBN: 978-981-19-8493-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)