Anton
Security Research Leader
As part of the Apriorit team, I aim at providing firsthand insights on tech and business, focusing on the true value of technologies and concepts and discussing pros and cons of applying them in IT projects.
More articles from author
Addressing AUTOSAR-Driven Challenges in Automotive SBOMs
Why are SBOMs important? Discover why they matter for automotive software development and learn key nuances of creating SBOMs for AUTOSAR-driven syste...
Automotive Cybersecurity Testing 101: Requirements, Best Practices, and Tips on Overcoming Challenges
Discover helpful tips for automotive cybersecurity testing to protect your software. Detect and fix vulnerabilities before they compromise your projec...
Anti Debugging Protection Techniques with Examples
This article considers popular anti-cracking, anti reverse engineering protection techniques, namely anti-debug methods in Windows OS.
9 Best Reverse Engineering Tools for 2024 [Updated]
Looking for the best reverse engineering tools? Read our review of the top nine reverse engineering programs for Windows.
How to Reverse Engineer Software (Windows) the Right Way
Searching how to reverse engineer software? Find out step by step tutorial on software reverse engineering process for Windows.
Extending IDAโs Capabilities with Python: A Practical Example of Disassembling an Xtensa Instruction
Extend the capabilities of IDA with Python: learn how to implement an IDA plugin for disassembling Xtensa instructions.
Reverse Engineering IoT Firmware: Where to Start
IoT firmware reverse engineering: explore how to improve the security of IoT devices based on a practical example of reverse engineering a smart air p...
How to Identify a Microcontroller Model Using Firmware Analysis
Use the firmware analysis process to automatically identify a microcontroller model you need to work with by analyzing the firmware source code.
How to Reverse Engineer a Proprietary File Format: A Brief Guide with Practical Examples
Learn when you need to reverse engineer a proprietary file format. Explore three examples of how you can reverse engineer closed file formats.