Digital Library


Search: "[ keyword: Reverse engineering ]" (5)
    Development of Analysis and Visualization Tool for Java Source Code Changes using Reverse Engineering Technique
    Jin Wook Kwon , Yun Ja Choi , Woo Jin Lee The KIPS Transactions:PartD, Vol. 19, No. 1, pp. 39-48, Feb. 2012
    10.3745/KIPSTD.2012.19.1.39

    Vulnerabilities Analysis of the OTP Implemented on a PC
    Woo Chan Hong , Kwang Woo Lee , Seung Joo Kim , Dong Ho Won The KIPS Transactions:PartC, Vol. 17, No. 4, pp. 361-370, Aug. 2010
    10.3745/KIPSTC.2010.17.4.361

    Analysis of Anti-Reversing Functionalities of VMProtect and Bypass Method Using Pin
    Seongwoo Park, Yongsu Park KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 11, pp. 297-304, Nov. 2021
    https://doi.org/10.3745/KTCCS.2021.10.11.297
    Keywords: Reverse engineering, Dynamic Analysis, Protector, Pin

    An Efficient Reengineering Process for Legacy System Evolution
    Choe Il U , Lyu Seong Yeol The KIPS Transactions:PartD, Vol. 10, No. 5, pp. 845-858, Aug. 2003
    10.3745/KIPSTD.2003.10.5.845

    Improved Original Entry Point Detection Method Based on PinDemonium
    Kim Gyeong Min, Park Yong Su KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 6, pp. 155-164, Jun. 2018
    10.3745/KTCCS.2018.7.6.155
    Keywords: computer security, Malicious Code Analysis, Unpacking, Reverse engineering, Dynamic Analysis, code obfuscation