Reverse Engineering Malicious Applications


  • Ioan Cristian Iacob IT&C Security Master Department of Economic Informatics and Cybernetics The Bucharest University of Economic Studies


Reverse Engineering, Applications, Malicious, Security, Malware


Detecting new and unknown malware is a major challenge in today’s software. Security profession. A lot of approaches for the detection of malware using data mining techniques have already been proposed. Majority of the works used static features of malware. However, static detection methods fall short of detecting present day complex malware. Although some researchers proposed dynamic detection methods, the methods did not use all the malware features. In this work, an approach for the detection of new and unknown malware was proposed and implemented. Each sample was reverse engineered for analyzing its effect on the operating environment and to extract the static and behavioral features. 


The “Practical Malware Analysis” book by Michael Sikorski and Andrew Honig

Bitdefender “Reverse Engineering Malware” course notes

Mandiant “Advanced Malware Analysis” course notes




How to Cite

Iacob, I. C. (2015). Reverse Engineering Malicious Applications. Journal of Mobile, Embedded and Distributed Systems, 7(2), 65-86. Retrieved from