Entries filed under 'Reverse Engineering'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
July 7, 2014 10:00 AM By Mike Sikorski
Interview Excerpt from "Practical Malware Analysis" Author and Mandiant Technical Director Michael SikorskiDecember 4, 2013 5:59 PM By Helena Brito
Recently, Mandiant's Technical Director, Michael Sikorski was interviewed for [IN]SECURE magazine. In his interview Mike discusses the inspiration for his book, "Practical Malware Analysis," his process for analyzing malware and offers advice for those interested in entering the field of malware analysis.Read more...
June 19, 2013 5:00 PM By Jay Smith
IDA Pro comes with an incredibly useful array of type information gathered from various compilers. Whenever a user names a location, IDA searches its currently loaded type libraries to see if that name is a known function. If the function is found, IDA applies the function declaration to that location. For example, Figure 1 shows an array of DWORDS. During reverse engineering, I determined that these are function pointers to MS SDK API functions.Read more...
March 12, 2013 6:26 PM By Helena Brito
As cybersecurity becomes more well-known outside our industry, the hope is to draw top talent to some of the most interesting careers within the field, such as reverse engineering. Unfortunately, there is still a large imbalance between men and women in cybersecurity; especially when it comes to highly technical positions.Read more...