<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>SEI Blog | Reverse Engineering for Malware Analysis</title><link href="http://sei.cmu.edu/feeds/topic/reverse-engineering-for-malware-analysis/atom/?utm_source=blog&amp;utm_medium=rss" rel="alternate"/><link href="http://sei.cmu.edu/feeds/topic/reverse-engineering-for-malware-analysis/atom/?utm_source=blog&amp;utm_medium=rss" rel="self"/><id>http://sei.cmu.edu/feeds/topic/reverse-engineering-for-malware-analysis/atom/?utm_source=blog&amp;utm_medium=rss</id><updated>2026-01-22T00:00:00-05:00</updated><subtitle>Updates on changes and additions to the                         SEI Blog for posts matching Reverse Engineering for Malware Analysis</subtitle><entry><title>An Open Source Tool to Unravel UEFI and its Vulnerabilities</title><link href="https://www.sei.cmu.edu/blog/an-open-source-tool-to-unravel-uefi-and-its-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2026-01-22T00:00:00-05:00</published><updated>2026-01-22T00:00:00-05:00</updated><author><name>Vijay Sarvepalli, Renae Metcalf, Cory Cohen</name></author><id>https://www.sei.cmu.edu/blog/an-open-source-tool-to-unravel-uefi-and-its-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post introduces CERT UEFI Parser, a new, open source tool that uses program analysis to reveal the architecture of UEFI software, and explore this veiled source of vulnerabilities.</summary></entry><entry><title>The Great Fuzzy Hashing Debate</title><link href="https://www.sei.cmu.edu/blog/the-great-fuzzy-hashing-debate/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-04-22T00:00:00-04:00</published><updated>2024-04-22T00:00:00-04:00</updated><author><name>Edward Schwartz</name></author><id>https://www.sei.cmu.edu/blog/the-great-fuzzy-hashing-debate/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post details a debate among two researchers over whether there is utility in applying fuzzy hashes to instruction bytes.</summary></entry><entry><title>Comparing the Performance of Hashing Techniques for Similar Function Detection</title><link href="https://www.sei.cmu.edu/blog/comparing-the-performance-of-hashing-techniques-for-similar-function-detection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-04-15T00:00:00-04:00</published><updated>2024-04-15T00:00:00-04:00</updated><author><name>Edward Schwartz</name></author><id>https://www.sei.cmu.edu/blog/comparing-the-performance-of-hashing-techniques-for-similar-function-detection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post explores the challenges of code comparison and presents a solution to the problem.</summary><category term="Fuzzy Hashing"/></entry><entry><title>Detecting and Grouping Malware Using Section Hashes</title><link href="https://www.sei.cmu.edu/blog/detecting-and-grouping-malware-using-section-hashes/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-06-05T00:00:00-04:00</published><updated>2023-06-05T00:00:00-04:00</updated><author><name>Timur Snoke, Michael Jacobs</name></author><id>https://www.sei.cmu.edu/blog/detecting-and-grouping-malware-using-section-hashes/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Current malware detection systems evaluate elements in a file or evaluate the file as a whole. New research shows other avenues for malware detection exist, specifically, breaking up the file into sections and then comparing the resulting parts.</summary></entry><entry><title>Two Tools for Malware Analysis and Reverse Engineering in Ghidra</title><link href="https://www.sei.cmu.edu/blog/two-tools-for-malware-analysis-and-reverse-engineering-in-ghidra/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-11-01T00:00:00-04:00</published><updated>2021-11-01T00:00:00-04:00</updated><author><name>Jeff Gennari</name></author><id>https://www.sei.cmu.edu/blog/two-tools-for-malware-analysis-and-reverse-engineering-in-ghidra/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post presents two tools for malware analysis and reverse engineering in Ghidra, the National Security Agency’s software reverse engineering tool suite.</summary></entry><entry><title>GhiHorn: Path Analysis in Ghidra Using SMT Solvers</title><link href="https://www.sei.cmu.edu/blog/ghihorn-path-analysis-in-ghidra-using-smt-solvers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-10-18T00:00:00-04:00</published><updated>2021-10-18T00:00:00-04:00</updated><author><name>Jeff Gennari</name></author><id>https://www.sei.cmu.edu/blog/ghihorn-path-analysis-in-ghidra-using-smt-solvers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">We believe that many common challenges in malware analysis and reverse engineering can be framed in terms of finding a path to a specific point in a program.</summary></entry><entry><title>Introducing CERT Kaiju: Malware Analysis Tools for Ghidra</title><link href="https://www.sei.cmu.edu/blog/introducing-cert-kaiju-malware-analysis-tools-for-ghidra/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-09-13T00:00:00-04:00</published><updated>2021-09-13T00:00:00-04:00</updated><author><name>Garret Wassermann, Jeff Gennari</name></author><id>https://www.sei.cmu.edu/blog/introducing-cert-kaiju-malware-analysis-tools-for-ghidra/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Ghidra provides a compelling environment for reverse engineering tools that are relatively easy to use during malware analysis. Our latest blog post highlights a new suite of tools, known as Kaiju, for malware analysis and reverse engineering to take advantage of Ghidra’s capabilities and interface.</summary><category term="Reverse Engineering for Malware Analysis"/></entry><entry><title>3 Ransomware Defense Strategies</title><link href="https://www.sei.cmu.edu/blog/3-ransomware-defense-strategies/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-11-09T00:00:00-05:00</published><updated>2020-11-09T00:00:00-05:00</updated><author><name>Marisa Midler</name></author><id>https://www.sei.cmu.edu/blog/3-ransomware-defense-strategies/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post covers strategies to mitigate RDP attacks &amp; software vulnerabilities, and how to protect against data exfiltration after phishing defense.</summary><category term="Ransomware"/></entry><entry><title>Using OOAnalyzer to Reverse Engineer Object Oriented Code with Ghidra</title><link href="https://www.sei.cmu.edu/blog/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-07-15T00:00:00-04:00</published><updated>2019-07-15T00:00:00-04:00</updated><author><name>Jeff Gennari</name></author><id>https://www.sei.cmu.edu/blog/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post explores how to use the new OOAnalyzer Ghidra Plugin to import C++ class information into the NSA's Ghidra tool and interpret results in the Ghidra SRE framework.</summary><category term="Reverse Engineering for Malware Analysis"/></entry><entry><title>Business Email Compromise: Operation Wire Wire and New Attack Vectors</title><link href="https://www.sei.cmu.edu/blog/business-email-compromise-operation-wire-wire-and-new-attack-vectors/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-04-08T00:00:00-04:00</published><updated>2019-04-08T00:00:00-04:00</updated><author><name>Anne Connell</name></author><id>https://www.sei.cmu.edu/blog/business-email-compromise-operation-wire-wire-and-new-attack-vectors/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In June 2018, Federal authorities announced a significant coordinated effort to disrupt business email compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals....</summary><category term="Malware"/><category term="Cyber Missions"/><category term="Best Practices in Network Security"/><category term="Social Engineering"/></entry><entry><title>Path Finding in Malicious Binaries: First in a Series</title><link href="https://www.sei.cmu.edu/blog/path-finding-in-malicious-binaries-first-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2018-12-10T00:00:00-05:00</published><updated>2018-12-10T00:00:00-05:00</updated><author><name>Jeff Gennari</name></author><id>https://www.sei.cmu.edu/blog/path-finding-in-malicious-binaries-first-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In a previous post, I discussed the Pharos Binary Analysis Framework and tools to support reverse engineering of binaries with a focus on malicious code analysis. Recall that Pharos is....</summary><category term="Reverse Engineering for Malware Analysis"/><category term="Malware Analysis"/><category term="Cyber Missions"/><category term="Malware"/></entry><entry><title>Security Begins at the Home Router</title><link href="https://www.sei.cmu.edu/blog/security-begins-at-the-home-router/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2018-07-30T00:00:00-04:00</published><updated>2018-07-30T00:00:00-04:00</updated><author><name>Vijay Sarvepalli</name></author><id>https://www.sei.cmu.edu/blog/security-begins-at-the-home-router/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In recent days, the VPNFilter malware has attracted attention, much of it in the wake of a May 25 public service announcement from the FBI, as well as a number of announcements from vendors and security companies....</summary><category term="Cyber Missions"/><category term="Malware"/></entry><entry><title>Big-Data Malware: Preparation and Messaging</title><link href="https://www.sei.cmu.edu/blog/big-data-malware-preparation-and-messaging/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2018-06-18T00:00:00-04:00</published><updated>2018-06-18T00:00:00-04:00</updated><author><name>Brent Frye</name></author><id>https://www.sei.cmu.edu/blog/big-data-malware-preparation-and-messaging/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Part one of this series of blog posts on the collection and analysis of malware and storage of malware-related data in enterprise systems reviewed practices for collecting malware, storing it, and storing data about it....</summary><category term="Cyber Missions"/><category term="Malware"/><category term="Data Modeling and Analytics"/></entry><entry><title>Big-Data Malware: Collection and Storage</title><link href="https://www.sei.cmu.edu/blog/big-data-malware-collection-and-storage/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2018-06-04T00:00:00-04:00</published><updated>2018-06-04T00:00:00-04:00</updated><author><name>Brent Frye</name></author><id>https://www.sei.cmu.edu/blog/big-data-malware-collection-and-storage/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The growth of big data has affected many fields, including malware analysis. Increased computational power and storage capacities have made it possible for big-data processing systems to handle the increased volume of data being collected....</summary><category term="Cyber Missions"/><category term="Malware"/><category term="Data Modeling and Analytics"/></entry><entry><title>Data Science, Blacklists, and Mixed-Critical Software: The Latest Research from the SEI</title><link href="https://www.sei.cmu.edu/blog/data-science-blacklists-and-mixed-critical-software-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2016-09-05T00:00:00-04:00</published><updated>2016-09-05T00:00:00-04:00</updated><author><name>Douglas Schmidt</name></author><id>https://www.sei.cmu.edu/blog/data-science-blacklists-and-mixed-critical-software-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Discover recently released SEI publications in early lifecycle cost estimation, host protection strategies, AADL, and more in this SEI Blog post.</summary><category term="Malware"/><category term="Software Architecture"/><category term="Architecture Analysis and Design Language (AADL)"/></entry><entry><title>Threat Analysis Mapping, Connected Vehicles, Emerging Technologies, and Cyber-Foraging: The Latest Research from the SEI</title><link href="https://www.sei.cmu.edu/blog/threat-analysis-mapping-connected-vehicles-emerging-technologies-and-cyber-foraging-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2016-05-02T00:00:00-04:00</published><updated>2016-05-02T00:00:00-04:00</updated><author><name>Douglas Schmidt</name></author><id>https://www.sei.cmu.edu/blog/threat-analysis-mapping-connected-vehicles-emerging-technologies-and-cyber-foraging-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Recently published SEI reports highlight the latest work of SEI technologists in estimating program costs early in the development lifecycle, threat analysis mapping, risks and vulnerabilities in connected vehicles, emerging technologies, and cyber-foraging.</summary><category term="Malware"/></entry><entry><title>Static Identification of Program Behavior using Sequences of API Calls</title><link href="https://www.sei.cmu.edu/blog/static-identification-of-program-behavior-using-sequences-of-api-calls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2016-04-11T00:00:00-04:00</published><updated>2016-04-11T00:00:00-04:00</updated><author><name>Jeff Gennari</name></author><id>https://www.sei.cmu.edu/blog/static-identification-of-program-behavior-using-sequences-of-api-calls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Learn how to statically characterize program behavior using API calls and how the SEI automated this reasoning with the malware analysis tool ApiAnalyzer.</summary><category term="Malware"/></entry><entry><title>The SEI Technical Strategic Plan</title><link href="https://www.sei.cmu.edu/blog/the-sei-technical-strategic-plan/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2015-08-24T00:00:00-04:00</published><updated>2015-08-24T00:00:00-04:00</updated><author><name>Kevin Fall</name></author><id>https://www.sei.cmu.edu/blog/the-sei-technical-strategic-plan/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post examines research undertaken by the SEI addressing key cybersecurity, software engineering, and related acquisition issues faced by DoD.</summary><category term="Big Data"/><category term="Malware"/></entry><entry><title>The Pharos Framework: Binary Static Analysis of Object Oriented Code</title><link href="https://www.sei.cmu.edu/blog/the-pharos-framework-binary-static-analysis-of-object-oriented-code/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2015-08-18T00:00:00-04:00</published><updated>2015-08-18T00:00:00-04:00</updated><author><name>Jeff Gennari</name></author><id>https://www.sei.cmu.edu/blog/the-pharos-framework-binary-static-analysis-of-object-oriented-code/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post discusses tools developed by the SEI's CERT Division to support reverse engineering and malware analysis tasks on C++ programs.</summary><category term="Malware"/></entry><entry><title>The 2014 Year in Review: Top 10 Blog Posts</title><link href="https://www.sei.cmu.edu/blog/the-2014-year-in-review-top-10-blog-posts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2014-12-22T00:00:00-05:00</published><updated>2014-12-22T00:00:00-05:00</updated><author><name>Douglas Schmidt</name></author><id>https://www.sei.cmu.edu/blog/the-2014-year-in-review-top-10-blog-posts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Discover the top 10 SEI Blog posts of 2014, and dive deeper into each area of research.</summary><category term="Devops"/><category term="Android"/><category term="Secure Coding"/><category term="Malware"/><category term="Agile"/><category term="Big Data"/></entry></feed>