CAPEC-189: Black Box Reverse Engineering

Standard Draft 严重程度: Low

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary discovers the structure, function, and composition of a type of computer software through black box analysis techniques. 'Black Box' methods involve interacting with the software indirectly, in the absence of direct access to the executable object. Such analysis typically involves interacting with the software at the boundaries of where the software interfaces with a larger execution environment, such as input-output vectors, libraries, or APIs. Black Box Reverse Engineering also refers to gathering physical side effects of a hardware device, such as electromagnetic radiation or sounds.

所需资源

  • Black box methods require (at minimum) the ability to interact with the functional boundaries where the software communicates with a larger processing environment, such as inter-process communication on a host operating system, or via networking protocols.
关键信息

CAPEC ID: CAPEC-189

抽象级别: Standard

状态: Draft

典型严重程度: Low

相关攻击模式