Dark Mode
Capec-189 Detail
Black Box Reverse Engineering
Standard Software Physical Security Hardware Typical Severity: Low
Parents: 188
Children: 621 622 623
Threats: T60 T291
An adversary discovers the structure, function, and composition of a type of computer software through black box analysis techniques. 'Black Box' methods involve interacting with the software indirectly, in the absence of direct access to the executable object. Such analysis typically involves interacting with the software at the boundaries of where the software interfaces with a larger execution environment, such as input-output vectors, libraries, or APIs. Black Box Reverse Engineering also refers to gathering physical side effects of a hardware device, such as electromagnetic radiation or sounds.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-189 | capec | https://capec.mitre.org/data/definitions/189.html | |
| CWE-203 | cwe | http://cwe.mitre.org/data/definitions/203.html | |
| CWE-1255 | cwe | http://cwe.mitre.org/data/definitions/1255.html | |
| CWE-1300 | cwe | http://cwe.mitre.org/data/definitions/1300.html |
Not present
Not present
- Black box methods require (at minimum) the ability to interact with the functional boundaries where the software communicates with a larger processing environment, such as inter-process communication on a host operating system, or via networking protocols.
Not present
Not present
Not present