Home > CAPEC List > CAPEC-167: White Box Reverse Engineering (Version 2.11)  

CAPEC-167: White Box Reverse Engineering

White Box Reverse Engineering
Definition in a New Window Definition in a New Window
Attack Pattern ID: 167
Abstraction: Standard
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

An attacker discovers the structure, function, and composition of a type of computer software through white box analysis techniques. White box techniques involve methods which can be applied to a piece of software when an executable or some other compiled object can be directly subjected to analysis, revealing at least a portion of its machine instructions that can be observed upon execution.

+ Attack Prerequisites
  • Direct access to the object or software.

+ Typical Severity


+ Resources Required

Reverse engineering of software requires varying tools and methods that enable the decompiling of executable or other compiled objects.

+ Content History
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team
CAPEC Content TeamThe MITRE Corporation2015-11-09Updated Activation_Zone, Attack_Prerequisites, Description Summary, Injection_Vector, Payload, Payload_Activation_Impact, Related_Attack_Patterns, Related_Weaknesses, Resources_RequiredInternal
Previous Entry Names
DatePrevious Entry Name
2015-11-09Lifting Sensitive Data from the Client

More information is available — Please select a different filter.
Page Last Updated or Reviewed: August 04, 2017