
Anton
Security Research Leader
As part of the Apriorit team, I aim at providing firsthand insights on tech and business, focusing on the true value of technologies and concepts and discussing pros and cons of applying them in IT projects.
More articles from author

Best Reverse Engineering Tools and Their Application: Apriorit’s Experience
Looking for the best reverse engineering tools? Read our review of the top reverse engineering programs for different operating systems.

How to Reverse Engineer Windows Software the Right Way: A Practical Example
Learn how to reverse engineer software on Windows legally using proven techniques, essential tools, and insights from Apriorit experts.

Addressing AUTOSAR-Driven Challenges in Automotive SBOMs
Why are SBOMs important? Discover why they matter for automotive software development and learn key nuances of creating SBOMs for AUTOSAR-driven syste...

Automotive Cybersecurity Testing 101: Requirements, Best Practices, and Tips on Overcoming Challenges
Discover helpful tips for automotive cybersecurity testing to protect your software. Detect and fix vulnerabilities before they compromise your projec...

Anti Debugging Protection Techniques with Examples
This article considers popular anti-cracking, anti reverse engineering protection techniques, namely anti-debug methods in Windows OS.
Extending IDA’s Capabilities with Python: A Practical Example of Disassembling an Xtensa Instruction
Extend the capabilities of IDA with Python: learn how to implement an IDA plugin for disassembling Xtensa instructions.
Reverse Engineering IoT Firmware: Where to Start
IoT firmware reverse engineering: explore how to improve the security of IoT devices based on a practical example of reverse engineering a smart air p...
How to Identify a Microcontroller Model Using Firmware Analysis
Use the firmware analysis process to automatically identify a microcontroller model you need to work with by analyzing the firmware source code.
How to Reverse Engineer a Proprietary File Format: A Brief Guide with Practical Examples
Learn when you need to reverse engineer a proprietary file format. Explore three examples of how you can reverse engineer closed file formats.