CAPEC-188 Metadata
Likelihood of Attack
Low
Typical Severity
Low
Overview
Summary
An adversary discovers the structure, function, and composition of an object, resource, or system by using a variety of analysis techniques to effectively determine how the analyzed entity was constructed or operates. The goal of reverse engineering is often to duplicate the function, or a part of the function, of an object in order to duplicate or "back engineer" some aspect of its functioning. Reverse engineering techniques can be applied to mechanical objects, electronic devices, or software, although the methodology and techniques involved in each type of analysis differ widely.
Prerequisites
Access to targeted system, resources, and information.
Potential Solutions / Mitigations
Employ code obfuscation techniques to prevent the adversary from reverse engineering the targeted entity.
Related Weaknesses (CWE)
CWE ID | Description |
---|---|
CWE-1278 | Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques |
Stay Ahead of Attack Patterns
Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.