Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems 2019
DOI: 10.1145/3290607.3313040
|View full text |Cite
|
Sign up to set email alerts
|

An Observational Investigation of Reverse Engineers' Process and Mental Models

Abstract: Reverse engineering is a complex process essential to software-security tasks such as vulnerability discovery and malware analysis. Significant research and engineering effort has gone into developing tools to support reverse engineers. However, little work has been done to understand the way reverse engineers think when analyzing programs, leaving tool developers to make interface design decisions based only on intuition.This paper takes a first step toward a better understanding of reverse engineers' process… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
30
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(31 citation statements)
references
References 69 publications
1
30
0
Order By: Relevance
“…This paper presented a coarse-grained, general workflow model of vulnerability research practices. The structure and content of our model aligns and expands upon with the model presented in Votipka et al (2019), suggesting that these findings will be replicable in further studies with larger participant pools, and will provide an empirical grounding for related research in VR. We would like to call particular attention to the need for further research and studies in the following areas.…”
Section: Practitioner Takeawayssupporting
confidence: 64%
See 1 more Smart Citation
“…This paper presented a coarse-grained, general workflow model of vulnerability research practices. The structure and content of our model aligns and expands upon with the model presented in Votipka et al (2019), suggesting that these findings will be replicable in further studies with larger participant pools, and will provide an empirical grounding for related research in VR. We would like to call particular attention to the need for further research and studies in the following areas.…”
Section: Practitioner Takeawayssupporting
confidence: 64%
“…This finding spurred additional research to integrate CRSs with human vulnerability researchers in a collaborative environment (Fraze, 2017;Shoshitaishvili et al, 2017). However, there is a very limited information in the literature that empirically examines VR work habits, behaviors, and practices, excepting the work of Votipka, Rabin, Micinski, Foster, & Mazurek (2019), limiting designers' and engineers' ability to effectively integrate CRSs into a collaborative humanmachine system.…”
Section: Research Motivations and Objectivesmentioning
confidence: 99%
“…Human studies in this domain have used a range of techniques to gain process insights, including post-hoc analysis or surveys as in [9] (potentially missing automatic decisions), think-aloud protocols or semi-structured interviews as in [45] (potentially changing analysts' approaches), or in situ data collection (potentially losing information about the relevance of actions). Other studies, like ours, take the general approach used in cognitive science research: developing a task that explores the cognitive processes of interest but is controlled enough to support understanding the data.…”
Section: Related Workmentioning
confidence: 99%
“…While RE tasks are often partially automated (e.g., via decompilation), full automation is often impossible: the extreme semantic expressivity afforded to binaries (including encrypted code, stripped symbol tables, etc..) often necessitates open-ended exploration and case-specific reasoning. Recent literature suggests that many practicioners follow an iterative approach involving several rounds of hypothesis formation and validation/falsification, often assisated via a combination of static and dynamic analysis [1]- [3].…”
Section: Introductionmentioning
confidence: 99%
“…To rapidly interact with a binary, RE practicioners often use reverse engineering tools such as Ghidra [4], IDA Pro [5], or Radare2 [6]. The goal of these tools is to allow an RE 1 to quickly explore the binary and visualize it (typically D 3 RE vision. d3re allows REs to interactively define and calculate queries of arbitrary complexity over large production binaries and then visualize their results using Ghidra.…”
Section: Introductionmentioning
confidence: 99%