Computer Science SFS Students Invited to Speak in the 2016 Women in Cyber Security Conference
sharing knowledge, experience, networking, and mentoring other women.
Aranya Ajith and Rebecca Powell will be talking about what reverse engineering is used for and mainly the difference between static and dynamic reverse engineering. An excerpt from their talk: “Reverse Engineering disassembles code to analyze its features, and understand weaknesses and exploits. It is a powerful tool for the programmer, the security analyst, but also for the adversary. For the programmer, to design better code; for the analyst, to understand its structure and potential malicious traits; and for the adversary, to take
control of the application. Dynamic analysis allows for the inspection of the behavior of the code as it runs: what processes it starts, what locations it attempts to access, while static program analysis is another semi-easy practical way of learning x86 and how it plays into malware analysis without having any risk of infecting the machine while still
being able to learn vital strings, host-based indicators, network-based indicators, etc. Understanding how to use these tools, and how to interpret the pseudocode, is the real challenge: it is hands-on and involves most of the effort. Understanding the theory is far less challenging.”