Anton
Security Research Leader
As part of the Apriorit team, I aim at providing firsthand insights on tech and business, focusing on the true value of technologies and concepts and discussing pros and cons of applying them in IT projects.
More articles from author
How to Reverse Engineer Software (Windows) the Right Way
Have you ever felt a desire to take some mechanism apart to find out how it works? That desire is the leading force in reverse engineering. This skill...
Extending IDA’s Capabilities with Python: A Practical Example of Disassembling an Xtensa Instruction
Reverse engineering rare architectures can bring multiple benefits to a project, but it’s an extremely challenging task. Even if a development t...
9 Best Reverse Engineering Tools for 2024 [Updated]
Reversing is complex. Yet software developers often turn to reverse engineering when faced with a challenging task: enhancing software security, makin...
Reverse Engineering IoT Firmware: Where to Start
Internet of Things (IoT) devices are already a significant part of our day-to-day life, work environments, hospitals, government facilities, and vehic...
How to Identify a Microcontroller Model Using Firmware Analysis
Microcontrollers have limited protection against cybersecurity threats and attacks. As a result, the security of Internet of Things (IoT) devices and...
How to Reverse Engineer a Proprietary File Format: A Brief Guide with Practical Examples
Modern IT products often have to handle various file formats. And while it’s quite easy to ensure compatibility with open file formats, making your...
How to Reverse Engineer an Undocumented macOS API to Use It in a Swift Project
Today’s software solutions require continuous improvements. But what used to take weeks or even months can now be done with a couple lines of code...
Discovering and Mitigating Security Vulnerabilities in Routers: A Practical Guide
Reliable and secure routers are key to the normal work of any organization. If these devices are poorly protected, they can expose corporate networks...
Automotive Security Testing 101: Requirements, Best Practices, Tips on Overcoming Challenges
The average luxury car contains more lines of code than the Boeing 787 Dreamliner, F-35 Joint Strike Fighter, and F-22 Raptor combined. This amount of...