CAPEC-188 Reverse Engineering

CAPEC ID: 188

CAPEC-188 Metadata

Likelihood of Attack

Low

Typical Severity

Low

Overview

Summary

An adversary discovers the structure, function, and composition of an object, resource, or system by using a variety of analysis techniques to effectively determine how the analyzed entity was constructed or operates. The goal of reverse engineering is often to duplicate the function, or a part of the function, of an object in order to duplicate or "back engineer" some aspect of its functioning. Reverse engineering techniques can be applied to mechanical objects, electronic devices, or software, although the methodology and techniques involved in each type of analysis differ widely.

Prerequisites

Access to targeted system, resources, and information.

Potential Solutions / Mitigations

Employ code obfuscation techniques to prevent the adversary from reverse engineering the targeted entity.

Related Weaknesses (CWE)

CWE ID Description
CWE-1278 Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.