This chapter discusses the anti-reversing techniques, which include concept of disassembly, anti debugging, and virtual machine detection. This is followed by a discussion on the packers and their protection mechanism. Packers, which disassemble the binaries, also prevent reverse engineering of software. The chapter concludes with the unpacking mechanisms. Some of these sections also appeared in the book titled "Vulnerability Analysis and Defense for the Internet".
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2009 Springer-Verlag US
About this chapter
Cite this chapter
Singh, A. (2009). Fundamental of Reverse Engineering. In: Identifying Malicious Code Through Reverse Engineering. Advances in Information Security, vol 44. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-89468-3_5
Download citation
DOI: https://doi.org/10.1007/978-0-387-89468-3_5
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-09824-1
Online ISBN: 978-0-387-89468-3
eBook Packages: Computer ScienceComputer Science (R0)