647,428 research outputs found
On the Reverse Engineering of the Citadel Botnet
Citadel is an advanced information-stealing malware which targets financial
information. This malware poses a real threat against the confidentiality and
integrity of personal and business data. A joint operation was recently
conducted by the FBI and the Microsoft Digital Crimes Unit in order to take
down Citadel command-and-control servers. The operation caused some disruption
in the botnet but has not stopped it completely. Due to the complex structure
and advanced anti-reverse engineering techniques, the Citadel malware analysis
process is both challenging and time-consuming. This allows cyber criminals to
carry on with their attacks while the analysis is still in progress. In this
paper, we present the results of the Citadel reverse engineering and provide
additional insight into the functionality, inner workings, and open source
components of the malware. In order to accelerate the reverse engineering
process, we propose a clone-based analysis methodology. Citadel is an offspring
of a previously analyzed malware called Zeus; thus, using the former as a
reference, we can measure and quantify the similarities and differences of the
new variant. Two types of code analysis techniques are provided in the
methodology, namely assembly to source code matching and binary clone
detection. The methodology can help reduce the number of functions requiring
manual analysis. The analysis results prove that the approach is promising in
Citadel malware analysis. Furthermore, the same approach is applicable to
similar malware analysis scenarios.Comment: 10 pages, 17 figures. This is an updated / edited version of a paper
appeared in FPS 201
Reconstruction of metabolic networks from high-throughput metabolite profiling data: in silico analysis of red blood cell metabolism
We investigate the ability of algorithms developed for reverse engineering of
transcriptional regulatory networks to reconstruct metabolic networks from
high-throughput metabolite profiling data. For this, we generate synthetic
metabolic profiles for benchmarking purposes based on a well-established model
for red blood cell metabolism. A variety of data sets is generated, accounting
for different properties of real metabolic networks, such as experimental
noise, metabolite correlations, and temporal dynamics. These data sets are made
available online. We apply ARACNE, a mainstream transcriptional networks
reverse engineering algorithm, to these data sets and observe performance
comparable to that obtained in the transcriptional domain, for which the
algorithm was originally designed.Comment: 14 pages, 3 figures. Presented at the DIMACS Workshop on Dialogue on
Reverse Engineering Assessment and Methods (DREAM), Sep 200
Strategies for protecting intellectual property when using CUDA applications on graphics processing units
Recent advances in the massively parallel computational abilities of graphical processing units (GPUs) have increased their use for general purpose computation, as companies look to take advantage of big data processing techniques. This has given rise to the potential for malicious software targeting GPUs, which is of interest to forensic investigators examining the operation of software. The ability to carry out reverse-engineering of software is of great importance within the security and forensics elds, particularly when investigating malicious software or carrying out forensic analysis following a successful security breach. Due to the complexity of the Nvidia CUDA (Compute Uni ed Device Architecture) framework, it is not clear how best to approach the reverse engineering of a piece of CUDA software. We carry out a review of the di erent binary output formats which may be encountered from the CUDA compiler, and their implications on reverse engineering. We then demonstrate the process of carrying out disassembly of an example CUDA application, to establish the various techniques available to forensic investigators carrying out black-box disassembly and reverse engineering of CUDA binaries. We show that the Nvidia compiler, using default settings, leaks useful information. Finally, we demonstrate techniques to better protect intellectual property in CUDA algorithm implementations from reverse engineering
On Reverse Engineering in the Cognitive and Brain Sciences
Various research initiatives try to utilize the operational principles of
organisms and brains to develop alternative, biologically inspired computing
paradigms and artificial cognitive systems. This paper reviews key features of
the standard method applied to complexity in the cognitive and brain sciences,
i.e. decompositional analysis or reverse engineering. The indisputable
complexity of brain and mind raise the issue of whether they can be understood
by applying the standard method. Actually, recent findings in the experimental
and theoretical fields, question central assumptions and hypotheses made for
reverse engineering. Using the modeling relation as analyzed by Robert Rosen,
the scientific analysis method itself is made a subject of discussion. It is
concluded that the fundamental assumption of cognitive science, i.e. complex
cognitive systems can be analyzed, understood and duplicated by reverse
engineering, must be abandoned. Implications for investigations of organisms
and behavior as well as for engineering artificial cognitive systems are
discussed.Comment: 19 pages, 5 figure
The efficiency of reverse engineering in the design of the ORCA XI autonomous underwater vehicle by Rachel E. Sharples.
Thesis (S.B.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 2010.Cataloged from PDF version of thesis.Includes bibliographical references (p. 40).Reverse engineering is the process of determining how a system works to aid duplication, maintenance, or redesign. Applications of reverse engineering include mechanical, electrical, software, and process systems. Although it has been known for centuries in the vernacular as tinkering with things to see how they work, reverse engineering has only recently been recognized as a systematic process valid for study. Reverse engineering can be applied to both simple and complex systems. The MIT ORCA team applied reverse engineering to build ORCA XI, the first autonomous underwater vehicle (AUV) to issue forth from the ORCA Project in several years. In addition to college-level systems, reverse engineering can be applied to navies, aiding in the prototyping of individual vessels as well as the manufacturing of entire fleets. There is evidence that China is using reverse engineering in this manner to develop a regionally-capable navy. The effectiveness of reverse engineering on the ORCA Project is compared to that of the Chinese navy to determine how a reverse engineering method could be expected to scale from a simple system to a more complex one. To quantify the relationship between the complexity of the system and how effective reverse engineering that system is, a reverse engineering efficiency based on the time necessary to complete a project with reverse engineering and the time necessary to complete the same project without reverse engineering was used. The efficiency values obtained from this comparison show that applying reverse engineering to an AUV can be just as effective as applying reverse engineering to a naval vessel, but that designing the production line necessary to manufacture a fleet of vessels decreases the efficiency of reverse engineering. These results suggest that new reverse engineering methodologies can be tested for efficiency on simple prototypes before being applied to time-consuming, complex projects.S.B
Impact of environmental inputs on reverse-engineering approach to network structures
Background: Uncovering complex network structures from a biological system is one of the main topic in system biology. The network structures can be inferred by the dynamical Bayesian network or Granger causality, but neither techniques have seriously taken into account the impact of environmental inputs.
Results: With considerations of natural rhythmic dynamics of biological data, we propose a system biology approach to reveal the impact of environmental inputs on network structures. We first represent the environmental inputs by a harmonic oscillator and combine them with Granger causality to identify environmental inputs and then uncover the causal network structures. We also generalize it to multiple harmonic oscillators to represent various exogenous influences. This system approach is extensively tested with toy models and successfully applied to a real biological network of microarray data of the flowering genes of the model plant Arabidopsis Thaliana. The aim is to identify those genes that are directly affected by the presence of the sunlight and uncover the interactive network structures associating with flowering metabolism.
Conclusion: We demonstrate that environmental inputs are crucial for correctly inferring network structures. Harmonic causal method is proved to be a powerful technique to detect environment inputs and uncover network structures, especially when the biological data exhibit periodic oscillations
Reverse-engineering of architectural buildings based on an hybrid modeling approach
We thank MENSI and REALVIZ companies for their helpful comments and the following people for providing us images from their works: Francesca De Domenico (Fig. 1), Kyung-Tae Kim (Fig. 9). The CMN (French national center of patrimony buildings) is also acknowledged for the opportunity given to demonstrate our approach on the Hotel de Sully in Paris. We thank Tudor Driscu for his help on the English translation.This article presents a set of theoretical reflections and technical demonstrations that constitute a new methodological base for the architectural surveying and representation using computer graphics techniques. The problem we treated relates to three distinct concerns: the surveying of architectural objects, the construction and the semantic enrichment of their geometrical models, and their handling for the extraction of dimensional information. A hybrid approach to 3D reconstruction is described. This new approach combines range-based modeling and image-based modeling techniques; it integrates the concept of architectural feature-based modeling. To develop this concept set up a first process of extraction and formalization of architectural knowledge based on the analysis of architectural treaties is carried on. Then, the identified features are used to produce a template shape library. Finally the problem of the overall model structure and organization is addressed
- …