Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3338503.3357725acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
tutorial

Hands-On Ghidra - A Tutorial about the Software Reverse Engineering Framework

Published: 15 November 2019 Publication History

Abstract

In this tutorial, the Ghidra software reverse engineering framework will be presented, its characteristics highlighted and its features to the hitherto industry standard in reverse engineering tools, IDA Pro - the interactive disassembler, compared against. This framework was released on March the 5th 2019, by the National Security Agency under the Apache v2 license and brought with it a powerful decompiler for many different architectures (X86 16/32/64, ARM/AARCH64, Java/DEX bytecode, ...), which will be presented and its underlying intermediate language p-code and the corresponding SLEIGH-format explained. Further, hands-on demonstrations will follow, including the aforementioned SLEIGH-format, the plugin-system and the standalone-mode, showcased on different reverse engineering tasks like binary diffing, code lifting, deobfuscation and patching.

References

[1]
Vector 35. 2019. Binary Ninja: A New Kind of Reversing Platform. Retrieved August 29, 2019 from https://binary.ninja/
[2]
National Security Agency. 2019. Ghidra - Software Reverse Engineering Framework. Retrieved August 29, 2019 from https://www.nsa.gov/resources/everyone/ghidra/
[3]
National Security Agency. 2019. Ghidra - Software Reverse Engineering Framework. Retrieved August 29, 2019 from https://github.com/NationalSecurityAgency/ghidra
[4]
Chris Eagle. 2011. The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler. No Starch Press, San Francisco, CA, USA.
[5]
Hex-Rays. 2019. IDA Pro - The Interactive Disassembler. Retrieved August 29, 2019 from https://www.hex-rays.com/products/ida/
[6]
pancake aka @trufae. 2019. Unix-like reverse engineering framework and command line tools. Retrieved August 29, 2019 from https://rada.re/r/
[7]
CEA IT Security. 2019. Miasm - Reverse engineering framework in Python. Retrieved August 29, 2019 from https://github.com/cea-sec/miasm

Cited By

View all
  • (2024)Log refusion: adversarial attacks against the integrity of application logs and defense methodsSCIENTIA SINICA Informationis10.1360/SSI-2024-004254:9(2157)Online publication date: 10-Sep-2024
  • (2024)CRABS-former: CRoss-Architecture Binary Code Similarity Detection based on TransformerProceedings of the 15th Asia-Pacific Symposium on Internetware10.1145/3671016.3671390(11-20)Online publication date: 24-Jul-2024
  • (2024)Scalable, Sound, and Accurate Jump Table AnalysisProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3680301(541-552)Online publication date: 11-Sep-2024
  • Show More Cited By

Index Terms

  1. Hands-On Ghidra - A Tutorial about the Software Reverse Engineering Framework

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SPRO'19: Proceedings of the 3rd ACM Workshop on Software Protection
    November 2019
    87 pages
    ISBN:9781450368353
    DOI:10.1145/3338503
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 November 2019

    Check for updates

    Author Tags

    1. code lifting
    2. decompilation
    3. disassembly
    4. framework
    5. reverse engineering

    Qualifiers

    • Tutorial

    Conference

    CCS '19
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 8 of 14 submissions, 57%

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)107
    • Downloads (Last 6 weeks)16
    Reflects downloads up to 04 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Log refusion: adversarial attacks against the integrity of application logs and defense methodsSCIENTIA SINICA Informationis10.1360/SSI-2024-004254:9(2157)Online publication date: 10-Sep-2024
    • (2024)CRABS-former: CRoss-Architecture Binary Code Similarity Detection based on TransformerProceedings of the 15th Asia-Pacific Symposium on Internetware10.1145/3671016.3671390(11-20)Online publication date: 24-Jul-2024
    • (2024)Scalable, Sound, and Accurate Jump Table AnalysisProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3680301(541-552)Online publication date: 11-Sep-2024
    • (2024)Challenges in Dynamic Analysis of Drone Firmware and Its SolutionsIEEE Access10.1109/ACCESS.2024.342560412(106593-106604)Online publication date: 2024
    • (2024)A practical approach for finding anti-debugging routines in the Arm-Linux using hardware tracingScientific Reports10.1038/s41598-024-65374-w14:1Online publication date: 26-Jun-2024
    • (2023)SAFERProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620319(1451-1468)Online publication date: 9-Aug-2023
    • (2023)Delving Deep into Reverse Engineering of UEFI Firmwares via Human Interface InfrastructureElectronics10.3390/electronics1222460112:22(4601)Online publication date: 10-Nov-2023
    • (2023)Accurate Disassembly of Complex Binaries Without Use of Compiler MetadataProceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 410.1145/3623278.3624766(1-18)Online publication date: 25-Mar-2023
    • (2023)Poster: Combining Fuzzing with Concolic Execution for IoT Firmware TestingProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3624373(3564-3566)Online publication date: 15-Nov-2023
    • (2023)A survey on run-time packers and mitigation techniquesInternational Journal of Information Security10.1007/s10207-023-00759-y23:2(887-913)Online publication date: 1-Nov-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media