Mid-Term Report Summary - ROSETTA (Rosetta s Way Back to the Source: <br/>Towards Reverse Engineering of Complex Software)
Also, we have started to apply reverse engineering against malware.
Malware is particularly challenging for reverse engineers, because it often employs defenses against analysis in general and reverse engineering in particular. We have started our investigations with a detailed analysis of the Zeus malware and similar peer-to-peer botnets. We have found that such malware has become so resilient against take-down attacks that it will be close to impossible to dismantle them without breaking into the systems themselves.