Analysis is performed on an initially unknown binary program. Forensically sound techniques are used, as well as manual decompilation and a review of the decompilation process.
Michael Murr
Digging Covert Tunnels
Back to Papers