Anton
Security Research Leader
As part of the Apriorit team, I aim at providing firsthand insights on tech and business, focusing on the true value of technologies and concepts and discussing pros and cons of applying them in IT projects.
More articles from author
Extending IDA’s Capabilities with Python: A Practical Example of Disassembling an Xtensa Instruction
During reverse engineering, you can end up in a situation when the available tools don’t yet support the architecture you’re working with. In this...
9 Best Reverse Engineering Tools for 2023 [Updated]
Reversing is complex. Yet software developers often turn to reverse engineering when faced with a challenging task: enhancing software security, makin...
Reverse Engineering IoT Firmware: Where to Start
Internet of Things (IoT) devices are already a significant part of our day-to-day life, work environments, hospitals, government facilities, and vehic...
How to Identify a Microcontroller Model Using Firmware Analysis
Microcontrollers have limited protection against cybersecurity threats and attacks. As a result, the security of Internet of Things (IoT) devices and...
How to Reverse Engineer a Proprietary File Format: A Brief Guide with Practical Examples
Modern IT products often have to handle various file formats. And while it’s quite easy to ensure compatibility with open file formats, making your...
How to Reverse Engineer an Undocumented macOS API to Use It in a Swift Project
Today’s software solutions require continuous improvements. But what used to take weeks or even months can now be done with a couple lines of code...
Discovering and Mitigating Security Vulnerabilities in Routers: A Practical Guide
Reliable and secure routers are key to the normal work of any organization. If these devices are poorly protected, they can expose corporate networks...
Automotive Security Testing 101: Requirements, Best Practices, Tips on Overcoming Challenges
The average luxury car contains more lines of code than the Boeing 787 Dreamliner, F-35 Joint Strike Fighter, and F-22 Raptor combined. This amount of...
The Evolution of Reverse Engineering: From Manual Reconstruction to Automated Disassembling
Reverse engineering can help you accomplish some of the most challenging tasks: researching malware, analyzing intellectual property rights violations...