Dark Mode

Settings

Capec-189 Detail

Black Box Reverse Engineering

Standard Software Physical Security Hardware Typical Severity: Low

Parents: 188

Children: 621 622 623

Threats: T60 T291

Description

An adversary discovers the structure, function, and composition of a type of computer software through black box analysis techniques. 'Black Box' methods involve interacting with the software indirectly, in the absence of direct access to the executable object. Such analysis typically involves interacting with the software at the boundaries of where the software interfaces with a larger execution environment, such as input-output vectors, libraries, or APIs. Black Box Reverse Engineering also refers to gathering physical side effects of a hardware device, such as electromagnetic radiation or sounds.

Not present

Not present

Not present

  1. Black box methods require (at minimum) the ability to interact with the functional boundaries where the software communicates with a larger processing environment, such as inter-process communication on a host operating system, or via networking protocols.

Not present

Not present

Not present