Academia.eduAcademia.edu

The Cyber Security Incident Response and Reverse Engineering

2022

Although the incident response has always been a crucial component of information security, security administrators frequently ignore it. Whereas, Reverse engineering focuses on the difficult issue of analyzing legacy software code in the absence of appropriate documentation. This paper proposes an approach to understanding cyber security Incident Response and the services it provides followed by Reverse Engineering resources and the practical analysis of a malware named "Alice ATM Malware" in detail.

LGU (IJECI) ISSN: 2522-3429 (Print) ISSN: 2616-6003 (Online) Taseer et al.LGU (IJECI) 2022 LGU International Journal for Electronic Crime Investigation Vol. 6 issue 4 Year 2022 Research Article Cyber Security Incident Response and Reverse Engineering Taseer Suleman and Nadia Liaquat School of Electrical Engineering and Computer Sciences, NUST, Islamabad, Pakistan Corresponding authores: [email protected], [email protected] Received: 11 September, 2022; Accepted: 14 November, 2022; Published: 20 December, 2022 Abstract Although the incident response has always been a crucial component of information security, security administrators frequently ignore it. Whereas, Reverse engineering focuses on the difficult issue of analyzing legacy software code in the absence of appropriate documentation. This paper proposes an approach to understanding cyber security Incident Response and the services it provides followed by Reverse Engineering resources and the practical analysis of a malware named “Alice ATM Malware” in detail. Key words: Cybersecurity Incident, Indicator of compromise, Digital defenses, Computer Security Incident Response Team, IDA de-compilers, Reverse Engineering. 1. Introduction H ighly skilled attackers provide a continuing threat to organizations. Attackers constantly discover new ways to breach organizations’ digital defenses to steal information or destroy their operations. The threat landscape is rapidly changing (Ahmad et al. 2019). There is a lot of ongoing research on how to reinforce these digital defenses, but relatively little is done to improve the process that takes over when things go wrong: incident response (IR) [1]. When digital defenses fail, cybersecurity incident response teams are at the forefront and must intervene to reinstitute services andical problems are impeding the incident response team’s capacity to respond to cyber-attacks (Nyre-Yu et al. 2019) [2]. By removing these obstacles, organizations may be better able to respond to incidents in general. One method to achieve this is through training, particularly employing training scenarios, which can boost team cybersecurity performance by developing skills and spotting possible flaws. The most significant information technology advancements are right in front of us right now. Given that approximately one billion computers in our world are currently connected to the Internet and that mobile telephony services and e-commerce have converged, enormous amounts of information can go from one network to another with only LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) 15 Cyber Security Incident Response and Reverse Engineering one request, command, or click (Global Reach, 2005). To this degree, numerous technologies, platforms, and infrastructures are flourishing to give services to the end user, who now serves as the target point because it is the user who asks for services, accesses networks, and resources, and needs security and privacy [3]. Expertise in fields like forensic investigation and malware reverse engineering is frequently needed for incident response. Reverse engineering is the process through which a variety of items, including software, types of machinery, and architectural structures, are disassembled to obtain design data and is also known as back engineering. The reverse engineering method typically involves disassembling the parts of larger, more important products. The reader will learn about reverse engineering's common principles, applications, stages, and future in this article. It demonstrates how Reverse Engineering is constantly developing and influencing the idea of cyber security [4]. Software development can also benefit from reverse engineering since it allows developers to examine their code and identify potential flaws that were overlooked during software development but that an adversary could find through reverse engineering. In Cybersecurity it is important because it enables the extraction of Indicators of Compromise (IoC) from samples [5]. Typically IoC is file’s hashes, registry keys, import function and export functions, the programming language used, compilation date, IPs, emails, and even text strings that are present in the code, which are the traces left by attackers [6] [7]. 2. Incident Response 16 The handling of diverse security incidents, cyber threats, and data breaches involves an organized technique called incident response. A cyber attack or live incident's cost is to be identified, contained, and reduced using incident response techniques [8]. Although it is not the end-all solution, a solid incident response (IR) plan can seal a potential weakness to avoid more attacks. The response is a part of incident handling, which in turn looks at the coordination, logistics, and planning required to deal with a problem. This kind of work is normally handled by the Computer Security Incident Response Team (CSIRT), with assistance from the Security Operation Center. While incident management is the primary function of CSIRT, it also has reporting, analysis, and reaction responsibilities. Before these phases, the incident must be located and promptly reported [9]. The function of a SOC Analyst becomes crucial at this point. 2.1 Incident Response Services The most efficient incident response is carried out rapidly by trained responders. Organizations frequently lack the funding necessary to keep a fully functional incident response team on duty around the clock [10]. Working with an outside organization that provides qualified incident response services is one alternative. Getting involved with these organizations offers the following advantages: 2.1.1 Availability The cost and impact of an attack on the organization are reduced the faster the incident response team gets to work. Cybersecurity issues can happen at any time, and getting in touch with incident response team members LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) Cyber Security Incident Response and Reverse Engineering after hours might be challenging. To improve coverage and availability, professional incident response companies have numerous staff teams on hand. 2.1.2 Experience Managing security issues improperly can increase costs and harm a company. For instance, a ransomware attack might cause a system to become unstable, making it unlikely that encrypted data will be restored after a system restart. Professional incident responders have the experience necessary to accurately and efficiently address such security issues. 2.1.3 Specialized expertise Reverse engineering malware and forensic analysis are two skills that are frequently used in incident response. Even though the majority of businesses won't require these talents in-house, a specialized incident response team has access to the professionals they require to successfully manage cybersecurity problems. 2.1.4 Controlling all aspects of the incident response procedure All of the organization's incident response requirements should be met by outsourced incident response providers. This includes putting incident response plans in place, controlling identified intrusions, and thwarting potential attacks. 3. Incident Response Plan Phases It is a set of guidelines that must be followed during each stage of incident response. The components of a good incident response plan include a clear communication strategy, directives defining the duties and responsibilities of each person and organization, and protocols that must be followed at all times [11]. 3.1 Preparation The steps a business should take in the case of a disruptive incident are outlined in an effective incident response strategy. The plan starts by describing how a company should reduce the danger of a data leak [12]. Organizational data protection policies should be in line with security objectives and technology defenses throughout the preparation stage. You must, at the very least, guarantee that staff members have received training on information security. They should ideally also have specialized training in incident response. To make sure your sensitive data is adequately protected, you should audit your systems as well. 3.2 Identification The second component of incident response planning deals with the measures an organization takes to ascertain when one of its systems has been compromised [13]. You are better able to stop you may quickly recognize an incursion from an assault. You can save time and money even if it isn't possible by limiting the damage and hastening the response effort. The following inquiries should be addressed when determining a security incident: • Who found the opening? • How much of a breach is there? • Had an impact on our operations? • Where did the compromise originate? 3.3 Containment The third phase discusses the steps you should LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) 17 Cyber Security Incident Response and Reverse Engineering take to minimize harm after being infiltrated. Depending on the circumstances, this can require taking action to remove the criminal hacker from your networks or to isolate the already compromised data [14]. During this stage, you should consider whether systems need to be shut down or removed as well as whether there are any rapid fixes for vulnerabilities. 3.4 Eradication Fixing the fault that caused the data breach is the aim of phase four of a cyber incident response strategy. Again, the specifics will depend on the type of incident, but right now you need to determine how the information was disclosed and how to get rid of the threat [15]. For instance, you would remove the malicious software and isolate the affected areas if your firm had been compromised by malware In the meantime, you would lock down a worker's account if the attack resulted from their login information being stolen by a malicious hacker. 3.5 Recovery Getting your systems back online is the penultimate step in responding to a cyber incident once the threat has been eradicated. In some circumstances, this will be trickier to do than in others, but it's an important step that needs to be taken seriously. Without a strong recovery process, you might still be vulnerable to attacks, which would make the injury worse. As part of the recovery process, you should test and monitor the impacted systems after the 18 issue has been fixed. This guarantees that the measures you implement the function as planned and offers you the chance to fix any errors [16]. 3.6 Lessons Learned The final phase in the cyber incident response strategy is reviewing the occurrence and identifying potential areas for improvement. Your incident response team needs to meet to go over the parts of the plan that worked and any problems you encountered. It is important to review the process at every stage. Discuss what happened, why it happened, what you tried to stop it, and what may have been done differently. For instance, was the documentation effective and clear, and did the plan include any gaps? Before having this conversation, one to two weeks should have passed after the security incident; this will allow everyone to think about the incident in retrospect while still keeping it fresh in everyone's memory [17]. Instead of berating team members for prior mistakes, this stage's objective is to avoid inefficiencies from occurring again. Failures in the processed signal that the documentation was either unclear, the proper course of action wasn't specified, or staff training wasn't adequate. 4 Reverse engineering The procedure of obtaining knowledge or designing blueprints from everything created by humans is known as reverse engineering. The idea has likely existed since the Industrial LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) Cyber Security Incident Response and Reverse Engineering Revolution, long before computers or other contemporary technology. It closely resembles scientific research, in which an investigator seeks to identify the "blueprint" of an atom or the human mind. Reverse engineering is different from a traditional scientific study in that the artifact under investigation is human-made, as opposed to a natural event in scientific research [18]. When such information is lacking, reverse engineering is typically used to fill in the gaps in knowledge, ideas, and design philosophy. 4.1 Resources Used in Reverse Engineering Multiple tools are used to perform reverse engineering. These tools can help to debug, decompile and disassemble the application. 4.1.1 Debuggers GDB is a debugger for programming that may also be used to decipher binary code. While the assembly code is running, you can view the information in memory and registers [19]. Additionally, breakpoints can be added anywhere in the application using debuggers. 4.1.2 Disassembler Machine code is converted into a human-readable format using a disassembler. Because disassembled code lacks programmers' comments and annotations, reading it is more challenging than reading source code. 4.1.3 De compilers Although IDA is difficult to use and needs extensive programming knowledge, its technical level accurately captures the fundamental nature of reverse engineering (Seo et al., 2019). DE-compilation is the process of translating a compiled program into a higher-level symbolic language that humans can comprehend, and it particularly makes use of reverse engineering methods. 4.2 Stages in Reverse engineering By creating models that describe the current program and the assumed goal, reverse engineering can be accomplished. Three main phases make up this process: • Recovering from implementation. Prepare a preliminary model while learning about the application quickly. • Adaptive design. Foreign key references should be resolved and the database's mechanics reversed. • Retrieval of analysis. Eliminate any inaccuracies in the model and design artifacts. 4.2.1 Implementation Recovery You prepare an early model for reverse engineering during implementation recovery. The first model should only reflect the implementation and contain no inferences because it will be used as a reference. Reading through the most recent documentation and getting acquainted with a program is the first step. The resulting context makes it simpler to interact with application professionals and clarifies the developer's intention. This project ought to be finished in a few hours. Even though what you learn is unrelated to the actual reverse engineering, it is crucial since it enables you to make more LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) 19 Cyber Security Incident Response and Reverse Engineering accurate observations as you go. identity and foreign keys. The database structure is then typed in manually or automatically into a modeling program. Some tools have can read an RDBMS's system tables and seed a model. If you utilize these tools, you ought to at the very least glance over the database architecture to get a sense of the development approach. Design reclamation may result in optimizations and flaws, but it still reflects the DBMS paradigm in its ultimate form. The model will rarely be finished in practice. Some of the structure's components might be unclear. 4.2.2 Design Recovery You undo the database's mechanics during design recovery and just carry out simple operations. Conjecture and interpretation should wait until the analysis-recovery stage. In most cases, design recovery may be carried out independently, without assistance from application expertise. You fix three main problems at this stage. Identity: For the prospective entity type keys, unique indexes will typically be defined. Otherwise, search for uncommon data combinations, which can point to a candidate key but not confirm it. You can also guess potential keys by looking at names and styling conventions. A suspected foreign key may imply a comparable candidate key. Foreign keys: The most difficult aspect of design recovery is often identifying foreign keys or references between different tables. Foreign keys may be indicated by names and data types that match. Foreign keys and their referents can be declared by developers in some DBMSs, such as RDBMSs, but the majority of legacy applications do not use this feature. Queries: When they are available, queries can be used to improve your understanding of 20 4.2.3 Analysis Recovery The last step is analysis and recovery. The model is interpreted, improved, and made more abstract. During this stage is when you should speak with any available application professionals. Recovery from analysis consists of four basic steps. Clarification: Eliminate any existing design artifacts. For instance, file and database access keys do not include any essential information and are purely design options, thus they are not required to be included in an analytical model. Redundancy: Remove derived data type if it improves database design or if it was included for the wrong reasons. You might need to examine the data to determine whether a data structure is a duplicate. Errors: Resolve any leftover database problems. This phase of analysis recovery is necessary since you need to completely understand the database before you can say that the developer committed a mistake. An apparent error in the early stages might have been a fair procedure or the result of inadequate database understanding [20]. Integration of a model. Various information sources can result in various models. For instance, structure and data analysis is typically used to develop a reverse-engineered LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) Cyber Security Incident Response and Reverse Engineering model. A forward-engineered model could be created using a user manual. The final analysis model must incorporate all independent models. 5. Practical Demonstration Figure 1: Executable file This malware is detected on Virus total and 54 security vendors and 1 sandbox flagged this file as malicious on Virus Total. Figure 2: Results of Virus Total These are the libraries that are used by this malware. The following shown is the 32-bit executable file. The Alice ATM malware was discovered for the first time in November 2016 as part of an ATM malware research study with Europol EC3, however, researchers believe it has been present since 2014. Figure 3: Libraries used by the malware LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) 21 Cyber Security Incident Response and Reverse Engineering Ntdll.dll: A module containing NT system functionality is called ntdll.dll. The NT kernel functions are Figure 4: Functions that are used from this library. contained in the Microsoft-created file ntdll.dll, which is referred to as an "NT Layer DLL." Comctl.dll: A module called Comctl32.dll houses standard GUI elements used by Windows programs. Msxfs.dll: Microsoft didn’t provide much information on msxfs.dll. 22 LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) Cyber Security Incident Response and Reverse Engineering Malicious Strings: Figure 5: Malicious Strings Dynamic Analysis: number it wasn’t proceeding and when you entered 123 as pin it automatically processes the next step [21]. When running this malware it asks for the pin and it only takes 123 as a pin. It didn’t take any other number. When entering any other The "operator panel" is opened by entering a special PIN that is of 3 digits based on the terminal ID of the ATM. LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) 23 Cyber Security Incident Response and Reverse Engineering Figure 6: Running the malware Maybe here it defines the password. After entering the pin it asked to input the cassette id. The loaded cassettes holding the money are visible when the "operator panel" is opened. The values ID, Bills count, Bill value, Currency, and Result are shown. It displays all cassettes containing money in the machine. Figure7: Password Defined 24 LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) Cyber Security Incident Response and Reverse Engineering Figure 8: Entering the PIN At this point, it detects that is it running on an ATM. When running on XFS (Extension for Financial Services)-based machines, it accepts Figure 9: Second call In the second call, it calls the sub_401078 function. In this function it calls WFSStartUp, a connection is made between an application and the XFS Manager by WFSStartUp. It has input. For Microsoft Windows-based financial applications, particularly those that use specialized peripherals like ATMs, XFS offers a client-server architecture. to be the first XFS API function a program calls. XFS functions cannot be supplied by an application until a successful WFSStartUp has finished. After that, it made calls to the LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) 23 Cyber Security Incident Response and Reverse Engineering DialogBoxParamA Figure 10: DialogBoxParamA This function takes five parameters. It takes one function as a parameter. Figure 11: Function as parameter run the program and it takes decisions based on provided data is correct or not. This function that is going as a parameter is managed message box that appears when we 24 LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) Cyber Security Incident Response and Reverse Engineering The highlighted function is responsible to connect the despenser1 of the ATM. LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) 23 Cyber Security Incident Response and Reverse Engineering Alice connects to ATM’s CurrenyDispenser1 peripheral, and no other hardware; therefore criminal does not need to issue any command via PIN pad. From here we can see the malware name Project Alice 24 LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) Cyber Security Incident Response and Reverse Engineering the designated service that was started using WFSOpen. WFSClose is used to end a session or a series of service requests between the application and Then it calls WFSFreeResult, which informs the XFS manager that a memory buffer that was dynamically allocated by a service provider is ready to be released. An application uses this function to deallocate the memory. A second call was placed. All messages of the defined classes are forwarded to the window indicated in the hWndReg argument by WFSRegister, which enables event monitoring for the specified service via the specified window. For instance, the application can call WFSRegister with the parameters SYSTEM EVENT and USER EVENT to receive data for both system and user events. LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) 23 Cyber Security Incident Response and Reverse Engineering At this point, it decides to see if input caste is available or not if available it calls the highlighted function if not then it moves on else part and displays an error. WFSLock Establishes the application's sole authority over the designated service. Before beginning the transaction, the application needs to make sure that it has access to all the devices and that no other program will be able to utilize them until the transaction is finished. So here before starting the transaction, the application ensures that it has access to all devices and until a transaction is made, no other program can use them. For this, it uses 24 Utilizing the WFSLock function and its companion WFSUnlock allows for this. WFSExecute communicates a command specified by the service to a service provider. To run commands supplied by the service, use this function. A service that has been locked by a previous WFSLOCK FUNCTION is released by WFSUnlock. WFSLock & WFSUnlock. After calling the function WFSLock it will call the next command for execution. LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) Cyber Security Incident Response and Reverse Engineering Examining the next function, it monitors if the selected caste is available or not. It gives an error if the input caste is unavailable Before exiting the process it calls the function. In this function, it calls the WFSCleanUp function. An application is unplugged from the XFS manager via WFSCleanUp. The Flow of XFS APIs used: Key Points: This executable file, when provided is not named when I start reverse engineering I found a titled ‘Project Alice’. Alice ATM first asks for a pin after entering a pin opening the operator panel reveals the loaded cassettes that hold the money. While malware has one main function that it uses to connect to the currency dispenser peripheral in the ATM. During the reverse engineering process, I didn’t see that if it attempts to connect to other ATM hardware such as a PIN pad. So one thing is clear at this point it is not controlled by commands issued via Pin pad. How exactly it works: 1. It first calls WFSStartUp API to connect the application with the XFS manager. 2. After that it calls WFSRegister to enable event monitoring for the specified service. LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) 23 Cyber Security Incident Response and Reverse Engineering 3. Next, it makes a call to the WFSLock API to make sure that the application has access to all the devices before beginning the transaction and that no other application can use them until the transaction is finished. Utilizing the WFSLock function and its companion WFSUnlock allows for this. 4. Next, a call to WFSFreeResult alerts the XFS manager that a dynamically allocated memory buffer from a service provider has to be freed. An application uses this function to deallocate the memory. 5. Next, it calls WFSExecute to transmit a command specific to the service to a service provider. To run commands supplied by the service, use this function. Then it calls WFSUnlock to release a service that has been locked by a previous WFSLOCK function. 6. To disconnect the application from the XFS manager, it makes a final call to WFSCleanUp. 6. Conclusion The globe has suddenly become a global village as a result of the extraordinary rise of information technology. As it happens, it has made the world smaller and knowledge flow more freely. Additionally, it has increased internet vulnerabilities, threats, scams, and criminal activity. The privacy of people, organizations, and states has been violated by the accessibility, user-friendly hacking tools, and complexity of cyberattacks. A good computer and network security life cycle, which comprises countermeasures, detection, 26 and reaction, now includes incident response as a crucial component. An organization's information security policy should contain the necessary provisions, and from there, planning and organization are essential for a successful incident response effort. The planning and organizing for the incident response also includes developing a suitable incident response architecture, planning resource requirements, planning the use of technology, developing incident response procedures, cooperating with other teams and organizations, and developing appropriate metrics. Moreover, Reverse engineering encompasses a wide range of tasks, such as system data analysis and the DE compilation and disassembly of executable files and libraries. Reverse engineering is a technique used in computer security to analyze malware activities and develop solutions to stop them. 7. References [1]. A. Javaid, “Incident Response Planning for Data Protection”. SSRN Electronic Journal. Vol. 3, no.4. pp. 21-32. 2013. [2]. A. Ahmad, J. Hadgkiss, and A. B. Ruighaver. "Incident response teams–Challenges in supporting the organisational security function." Computers & Security. Vol. 31, no. 5. pp. 643-652. 2012. [3]. M. Kevin, C. Prosise, and M. Pepe. “Incident response & computer forensics”. New York: McGraw-Hill, vol, 2. 2003. LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) Cyber Security Incident Response and Reverse Engineering [4]. M. Hausi. "Reverse engineering: a roadmap." Proceedings of the Conference on the Future of Software Engineering. 2000. [5]. E. Eldad. “Reversing: secrets of reverse engineering”. John Wiley & Sons, 2011. [6]. [7]. U. K. Sharath, K. Saumya and M. Madou. "Deobfuscation: Reverse engineering obfuscated code." 12th Working Conference on Reverse Engineering (WCRE'05). IEEE, 2005. W. Wego. “Reverse engineering: Technology of reinvention”. Crc Press, 2010. [8]. S. Bruce. "The future of incident response." IEEE Security & Privacy. Vol. 12, no.5, pp. 96-96. 2014. [9]. W. Brown and J. Molra. Handbook for computer security incident response teams (CSIRTs). Carnegie-mellon univ pittsburgh pa software engineering inst, 2003. [10]. R. Werlinger, K. Muldner, K. Hawkey and K. Beznosov. “Preparation, detection, and analysis: the diagnostic work of IT security incident response”. Information Management & Computer Security.vol.3, pp.13-56, 2010. [11]. C. Rui. "Design principles for critical incident response systems." Information Systems and E-Business Management. Vol. 5, no. 3. Pp. 201-227. 2007. [12]. W. Rodrigo. "Preparation, detection, and analysis: the diagnostic work of IT security incident response." Information Management & Computer Security. 2010. [13]. G. George, W. B. Glisson, and T. Storer. "Rethinking security incident response: The integration of agile principles." arXiv preprint arXiv. Vol.3. pp. 1408.2431.2014. [14]. F. Felix and B. Schwittay. "A common process model for incident response and digital forensics." Proceedings of the IMF2007. 2007. [15]. L. Trevor. "A forensic approach to incident response”. Information Security Curriculum Development Conference. 2010. [16]. S. Alexander. "A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems." International Journal of Critical Infrastructure Protection. Vol. 37 . pp.100-105. 2022. [17]. S. Daniel, M. Caselli, and G. Pernul. "A comparative study on cyber threat intelligence: the security incident response perspective." IEEE Communications Surveys & Tutorials. vol. 23, no. 4. Pp. 2525-2556. 2021. [18]. H. A. Müller, J. H. Jahnke, D. B. Smith, and M. A. Storey. “Reverse engineering: a roadmap. InProceedings of the Conference on the Future of Software Engineering”. pp. 47-60. 2000. LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022) 27 Cyber Security Incident Response and Reverse Engineering [19]. H. Nikhil. "Where is the debugger for my software-defined network?." Proceedings of the first workshop on Hot topics in software defined networks. 2012. [20]. E. Stroulia and T. Systä. Dynamic analysis for reverse engineering and program understanding. ACM SIGAPP Applied Computing Review, vol.10, no. 1. pp. 8-17. 2002. [21]. S. Eleni, and T. Systa. "Dynamic analysis for reverse engineering and program understanding." ACM SIGAPP Applied Computing Review. Vol. 10, no.1. pp. 8-17. 2002. 28 LGU Int.J. Elect.Crime Investigation 6(4):LGUIJECI MS.ID- 03 (2022)