<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Reverse Engineering for Malware Analysis</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Reverse Engineering for Malware Analysis</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/reverse-engineering-for-malware-analysis/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 13 Sep 2021 00:00:00 -0400</lastBuildDate><item><title>Introducing CERT Kaiju: Malware Analysis Tools for Ghidra</title><link>https://www.sei.cmu.edu/blog/introducing-cert-kaiju-malware-analysis-tools-for-ghidra/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Ghidra provides a compelling environment for reverse engineering tools that are relatively easy to use during malware analysis. Our latest blog post highlights a new suite of tools, known as Kaiju, for malware analysis and reverse engineering to take advantage of Ghidra’s capabilities and interface.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Garret Wassermann, Jeff Gennari</dc:creator><pubDate>Mon, 13 Sep 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/introducing-cert-kaiju-malware-analysis-tools-for-ghidra/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Reverse Engineering for Malware Analysis</category></item><item><title>Using OOAnalyzer to Reverse Engineer Object Oriented Code with Ghidra</title><link>https://www.sei.cmu.edu/blog/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post explores how to use the new OOAnalyzer Ghidra Plugin to import C++ class information into the NSA's Ghidra tool and interpret results in the Ghidra SRE framework.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeff Gennari</dc:creator><pubDate>Mon, 15 Jul 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Reverse Engineering for Malware Analysis</category></item><item><title>Path Finding in Malicious Binaries: First in a Series</title><link>https://www.sei.cmu.edu/blog/path-finding-in-malicious-binaries-first-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In a previous post, I discussed the Pharos Binary Analysis Framework and tools to support reverse engineering of binaries with a focus on malicious code analysis. Recall that Pharos is....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeff Gennari</dc:creator><pubDate>Mon, 10 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/path-finding-in-malicious-binaries-first-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Reverse Engineering for Malware Analysis</category><category>Malware Analysis</category><category>Cyber Missions</category><category>Malware</category></item></channel></rss>