@inproceedings{7a905ddb9d0f4309a1caa0d241d88b31,
title = "Interactive function identification decreasing the effort of reverse engineering",
abstract = "Today{\textquoteright}s software is growing in size and complexity. Consequently analysing closed-source binaries becomes time-consuming and labour-intensive. In the common use case, the analyst is only interested in specific functions of the given application. Identifying the relevant functions is difficult since no related meta information is given. In this paper we present a framework which speeds up the reverse-engineering process using interactive function identification. We use the benefits of Dynamic Binary Instrumentation as base to collect the executed function calls. We support the analyst in filtering the relevant functions for specific functionality. Our approach is divided into three process steps. Realtime data gathering, user defined information processing/filtering and graphical representation. We show a significant speed up in the reverse engineering process using our framework. We reduce the number of executed functions to be viewed by the analyst more than 90% and due to visual components we help the analyst pre-selecting the functions on an abstract level.",
keywords = "IP protection, Information visualisation, Reverse engineering, Security",
author = "Fatih Kilic and Hannes Laner and Claudia Eckert",
note = "Publisher Copyright: {\textcopyright} Springer International Publishing Switzerland 2016.; 11th International Conference on Information Security and Cryptology, Inscrypt 2015 ; Conference date: 01-11-2015 Through 03-11-2015",
year = "2016",
doi = "10.1007/978-3-319-38898-4_27",
language = "English",
isbn = "9783319388977",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "468--487",
editor = "Dongdai Lin and Wang, {Xiao Feng} and Moti Yung",
booktitle = "Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Revised Selected Papers",
}