Active Reversing: The Next Generation Of Reverse Engineering presented at Blackhat USA 2007

by Greg Hoglund (HBGary),

Tags: Security

Summary : Most people think of reverse engineering
as a tedious process of reading disassembled CPU instructions and
attempting to predict or deduce what the original 'c' code was supposed
to look like. This process is difficult, time consuming, and expensive,
but it doesn't need to be. Software programs can be made to reverse
engineer themselves. Software, as a machine, can be understood by active
observation, as opposed to static decompilation and prediction. In
other words, you can reverse engineer software by using it, as opposed
to reading code.