Home > CAPEC List > CAPEC-167: White Box Reverse Engineering (Version 2.9)  

CAPEC-167: White Box Reverse Engineering

 
White Box Reverse Engineering
Definition in a New Window Definition in a New Window
Attack Pattern ID: 167
Abstraction: Standard
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

An attacker discovers the structure, function, and composition of a type of computer software through white box analysis techniques. White box techniques involve methods which can be applied to a piece of software when an executable or some other compiled object can be directly subjected to analysis, revealing at least a portion of its machine instructions that can be observed upon execution.

+ Attack Prerequisites
  • Direct access to the object or software.

+ Typical Severity

Medium

+ Resources Required

Reverse engineering of software requires varying tools and methods that enable the decompiling of executable or other compiled objects.

+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team
Modifications
ModifierOrganizationDateCommentsSource
CAPEC Content TeamThe MITRE Corporation2015-11-09Updated Activation_Zone, Attack_Prerequisites, Description Summary, Injection_Vector, Payload, Payload_Activation_Impact, Related_Attack_Patterns, Related_Weaknesses, Resources_RequiredInternal
Previous Entry Names
DatePrevious Entry Name
2015-11-09Lifting Sensitive Data from the Client

More information is available — Please select a different filter.
Page Last Updated or Reviewed: December 07, 2015