<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Reverse Engineering for Malware Analysis</title><link>http://www.sei.cmu.edu/feeds/topic/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Reverse Engineering for Malware Analysis</description><atom:link href="http://www.sei.cmu.edu/blog/feeds/topic/reverse-engineering-for-malware-analysis/rss/" rel="self"/><language>en-us</language><lastBuildDate>Thu, 22 Jan 2026 00:00:00 -0500</lastBuildDate><item><title>An Open Source Tool to Unravel UEFI and its Vulnerabilities</title><link>https://www.sei.cmu.edu/blog/an-open-source-tool-to-unravel-uefi-and-its-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post introduces CERT UEFI Parser, a new, open source tool that uses program analysis to reveal the architecture of UEFI software, and explore this veiled source of vulnerabilities.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli, Renae Metcalf, Cory Cohen</dc:creator><pubDate>Thu, 22 Jan 2026 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/an-open-source-tool-to-unravel-uefi-and-its-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>The Great Fuzzy Hashing Debate</title><link>https://www.sei.cmu.edu/blog/the-great-fuzzy-hashing-debate/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post details a debate among two researchers over whether there is utility in applying fuzzy hashes to instruction bytes.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Edward Schwartz</dc:creator><pubDate>Mon, 22 Apr 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-great-fuzzy-hashing-debate/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Comparing the Performance of Hashing Techniques for Similar Function Detection</title><link>https://www.sei.cmu.edu/blog/comparing-the-performance-of-hashing-techniques-for-similar-function-detection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post explores the challenges of code comparison and presents a solution to the problem.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Edward Schwartz</dc:creator><pubDate>Mon, 15 Apr 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/comparing-the-performance-of-hashing-techniques-for-similar-function-detection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Fuzzy Hashing</category></item><item><title>Detecting and Grouping Malware Using Section Hashes</title><link>https://www.sei.cmu.edu/blog/detecting-and-grouping-malware-using-section-hashes/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Current malware detection systems evaluate elements in a file or evaluate the file as a whole. New research shows other avenues for malware detection exist, specifically, breaking up the file into sections and then comparing the resulting parts.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timur Snoke, Michael Jacobs</dc:creator><pubDate>Mon, 05 Jun 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/detecting-and-grouping-malware-using-section-hashes/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Two Tools for Malware Analysis and Reverse Engineering in Ghidra</title><link>https://www.sei.cmu.edu/blog/two-tools-for-malware-analysis-and-reverse-engineering-in-ghidra/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post presents two tools for malware analysis and reverse engineering in Ghidra, the National Security Agency’s software reverse engineering tool suite.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeff Gennari</dc:creator><pubDate>Mon, 01 Nov 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/two-tools-for-malware-analysis-and-reverse-engineering-in-ghidra/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>GhiHorn: Path Analysis in Ghidra Using SMT Solvers</title><link>https://www.sei.cmu.edu/blog/ghihorn-path-analysis-in-ghidra-using-smt-solvers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>We believe that many common challenges in malware analysis and reverse engineering can be framed in terms of finding a path to a specific point in a program.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeff Gennari</dc:creator><pubDate>Mon, 18 Oct 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/ghihorn-path-analysis-in-ghidra-using-smt-solvers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid></item><item><title>Introducing CERT Kaiju: Malware Analysis Tools for Ghidra</title><link>https://www.sei.cmu.edu/blog/introducing-cert-kaiju-malware-analysis-tools-for-ghidra/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Ghidra provides a compelling environment for reverse engineering tools that are relatively easy to use during malware analysis. Our latest blog post highlights a new suite of tools, known as Kaiju, for malware analysis and reverse engineering to take advantage of Ghidra’s capabilities and interface.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Garret Wassermann, Jeff Gennari</dc:creator><pubDate>Mon, 13 Sep 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/introducing-cert-kaiju-malware-analysis-tools-for-ghidra/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Reverse Engineering for Malware Analysis</category></item><item><title>3 Ransomware Defense Strategies</title><link>https://www.sei.cmu.edu/blog/3-ransomware-defense-strategies/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post covers strategies to mitigate RDP attacks &amp; software vulnerabilities, and how to protect against data exfiltration after phishing defense.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Marisa Midler</dc:creator><pubDate>Mon, 09 Nov 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/3-ransomware-defense-strategies/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Ransomware</category></item><item><title>Using OOAnalyzer to Reverse Engineer Object Oriented Code with Ghidra</title><link>https://www.sei.cmu.edu/blog/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post explores how to use the new OOAnalyzer Ghidra Plugin to import C++ class information into the NSA's Ghidra tool and interpret results in the Ghidra SRE framework.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeff Gennari</dc:creator><pubDate>Mon, 15 Jul 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Reverse Engineering for Malware Analysis</category></item><item><title>Business Email Compromise: Operation Wire Wire and New Attack Vectors</title><link>https://www.sei.cmu.edu/blog/business-email-compromise-operation-wire-wire-and-new-attack-vectors/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In June 2018, Federal authorities announced a significant coordinated effort to disrupt business email compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anne Connell</dc:creator><pubDate>Mon, 08 Apr 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/business-email-compromise-operation-wire-wire-and-new-attack-vectors/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category><category>Cyber Missions</category><category>Best Practices in Network Security</category><category>Social Engineering</category></item><item><title>Path Finding in Malicious Binaries: First in a Series</title><link>https://www.sei.cmu.edu/blog/path-finding-in-malicious-binaries-first-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In a previous post, I discussed the Pharos Binary Analysis Framework and tools to support reverse engineering of binaries with a focus on malicious code analysis. Recall that Pharos is....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeff Gennari</dc:creator><pubDate>Mon, 10 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/path-finding-in-malicious-binaries-first-in-a-series/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Reverse Engineering for Malware Analysis</category><category>Malware Analysis</category><category>Cyber Missions</category><category>Malware</category></item><item><title>Security Begins at the Home Router</title><link>https://www.sei.cmu.edu/blog/security-begins-at-the-home-router/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In recent days, the VPNFilter malware has attracted attention, much of it in the wake of a May 25 public service announcement from the FBI, as well as a number of announcements from vendors and security companies....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli</dc:creator><pubDate>Mon, 30 Jul 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/security-begins-at-the-home-router/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Malware</category></item><item><title>Big-Data Malware: Preparation and Messaging</title><link>https://www.sei.cmu.edu/blog/big-data-malware-preparation-and-messaging/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Part one of this series of blog posts on the collection and analysis of malware and storage of malware-related data in enterprise systems reviewed practices for collecting malware, storing it, and storing data about it....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brent Frye</dc:creator><pubDate>Mon, 18 Jun 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/big-data-malware-preparation-and-messaging/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Malware</category><category>Data Modeling and Analytics</category></item><item><title>Big-Data Malware: Collection and Storage</title><link>https://www.sei.cmu.edu/blog/big-data-malware-collection-and-storage/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The growth of big data has affected many fields, including malware analysis. Increased computational power and storage capacities have made it possible for big-data processing systems to handle the increased volume of data being collected....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brent Frye</dc:creator><pubDate>Mon, 04 Jun 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/big-data-malware-collection-and-storage/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Malware</category><category>Data Modeling and Analytics</category></item><item><title>Data Science, Blacklists, and Mixed-Critical Software: The Latest Research from the SEI</title><link>https://www.sei.cmu.edu/blog/data-science-blacklists-and-mixed-critical-software-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover recently released SEI publications in early lifecycle cost estimation, host protection strategies, AADL, and more in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 05 Sep 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/data-science-blacklists-and-mixed-critical-software-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category><category>Software Architecture</category><category>Architecture Analysis and Design Language (AADL)</category></item><item><title>Threat Analysis Mapping, Connected Vehicles, Emerging Technologies, and Cyber-Foraging: The Latest Research from the SEI</title><link>https://www.sei.cmu.edu/blog/threat-analysis-mapping-connected-vehicles-emerging-technologies-and-cyber-foraging-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Recently published SEI reports highlight the latest work of SEI technologists in estimating program costs early in the development lifecycle, threat analysis mapping, risks and vulnerabilities in connected vehicles, emerging technologies, and cyber-foraging.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 02 May 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/threat-analysis-mapping-connected-vehicles-emerging-technologies-and-cyber-foraging-the-latest-research-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category></item><item><title>Static Identification of Program Behavior using Sequences of API Calls</title><link>https://www.sei.cmu.edu/blog/static-identification-of-program-behavior-using-sequences-of-api-calls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn how to statically characterize program behavior using API calls and how the SEI automated this reasoning with the malware analysis tool ApiAnalyzer.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeff Gennari</dc:creator><pubDate>Mon, 11 Apr 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/static-identification-of-program-behavior-using-sequences-of-api-calls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category></item><item><title>The SEI Technical Strategic Plan</title><link>https://www.sei.cmu.edu/blog/the-sei-technical-strategic-plan/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post examines research undertaken by the SEI addressing key cybersecurity, software engineering, and related acquisition issues faced by DoD.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Kevin Fall</dc:creator><pubDate>Mon, 24 Aug 2015 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-sei-technical-strategic-plan/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Big Data</category><category>Malware</category></item><item><title>The Pharos Framework: Binary Static Analysis of Object Oriented Code</title><link>https://www.sei.cmu.edu/blog/the-pharos-framework-binary-static-analysis-of-object-oriented-code/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post discusses tools developed by the SEI's CERT Division to support reverse engineering and malware analysis tasks on C++ programs.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeff Gennari</dc:creator><pubDate>Tue, 18 Aug 2015 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-pharos-framework-binary-static-analysis-of-object-oriented-code/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware</category></item><item><title>The 2014 Year in Review: Top 10 Blog Posts</title><link>https://www.sei.cmu.edu/blog/the-2014-year-in-review-top-10-blog-posts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover the top 10 SEI Blog posts of 2014, and dive deeper into each area of research.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 22 Dec 2014 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/the-2014-year-in-review-top-10-blog-posts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Devops</category><category>Android</category><category>Secure Coding</category><category>Malware</category><category>Agile</category><category>Big Data</category></item></channel></rss>