Reverse Engineering |
Attack Pattern ID: 188 (Meta Attack Pattern Completeness: Complete) | Typical Severity: Low | Status: Draft |
Reverse Engineering |
Attack Pattern ID: 188 (Meta Attack Pattern Completeness: Complete) | Typical Severity: Low | Status: Draft |
Summary
An attacker discovers the structure, function, and composition of an object, resource, or system by using a variety of analysis techniques to effectively determine how the analyzed entity was constructed or operates. The goal of reverse engineering is often to duplicate the function, or a part of the function, of an object in order to duplicate or "back engineer" some aspect of its functioning. Reverse engineering techniques can be applied to mechanical objects, electronic devices or components, or to software, although the methodology and techniques involved in each type of analysis differ widely.
Access to or control of an object, resource, or system, to be analyzed. The technical resources required to engage in reverse engineering differ in accordance with the type of object, resource, or system being analyzed.
Nature | Type | ID | Name | Description | View(s) this relationship pertains to![]() |
---|---|---|---|---|---|
ChildOf | ![]() | 281 | Analytic Attacks | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 189 | Software Reverse Engineering | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 192 | Protocol Reverse Engineering | Mechanism of Attack (primary)1000 |
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.