Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

"There are _a lot_ of forensic methods to reverse blur techniques"

Any examples? You can't reverse it if the data is gone.



sort by: page size:

Not specifically, more just the occasional paper you see posted where they've found a way to recover missing data from surrounding context. I.e. something like reverse engineering redaction boxes from JPEGs by reversing a non-lossless algorithm twice, once to get the lossy image in raw form with redactoin boxes, and at that point again to determine what was likely under those boxes from the surrounding lossy compression as it existed before.

Try reverse engineering or data recovery sometime.

>PCB reverse engineering is a reverse research technology that uses a series of reverse research techniques

Oh boy


At least most of the decompiler logic comes from formal methods, thus reducing possible edge cases compared to statistics. There's a room for AI in reversing, but it should be a specifically trained model with a carefully extracted features from binary, not only disassembly output: graphs, debug and demangling info, types, IL analysis results, etc.

All these GPT-based plugins are just toys. There's more serious research like this[1][2][3]

[1] https://keenlab.tencent.com/zh/2019/12/10/Tencent-Keen-Secur...

[2] https://keenlab.tencent.com/zh/2020/11/03/neurips-2020-camer...

[3] https://keenlab.tencent.com/zh/2021/08/11/2021-binaryai-publ...


You're thinking of reverse engineering.

I'm pretty sure there's a line there about reverse engineering

They could add the detection to GIMP. But then that would reveal what the algorithm is. And that would allow specific strategies for producing false negatives or false positives.

I'm still undecided about whether countermeasures to reverse engineering like this are useful or not in the long run.


> Reverse engineering is not research because someone already has the answer.

Someone potentially had the answer at one point. That person/organization may be dead/defunct, or the knowledge may otherwise be lost to time.


ah.. reverse engineering (of data and binaries) has a new fancy name: forensic. Fravia, where art tho..

This was a great post with references to many tricks and tools I was not aware of that might help me in similar endeavors. Do you have any particular advice for reverse engineering image data files (not encrypted, of a completely proprietary format)?

Reverse engineering data in commercial products. Of course this is not a viable solution for anything but private personal stuff.

Since the Zoom TOS explicitly forbid reverse engineering, sadly it isn't so easy.

> there exist some deobfuscators that bring the code back

Care to elaborate? The author of Movfuscator is very experienced and capable at reverse engineering. In one of his video talks he hits some Movfuscated code with some tools and says he doesn't know of anything that can deobfuscate it. That may have changed since then -- I'd be curious to know.


>Even through the protocol reversing angle.

This is reverse engineering in the same way that I redraw a map of my drainage pipes when there's a leak in my house. My plumber is not going to sue me and neither will Bose.


> The only definition of "reverse engineering software" that I use

Uhm, no, that's far too narrow. Reverse engineering is any kind of introspection into a device in question, designed for obtaining any degree of understanding of its inner functioning.

What you're talking about is called "decompilation", and it's not even among the most useful reverse engineering techniques.


That's a very different kind of reverse engineering

yea seems pretty easy then right, sounds like no source that is available for eyes to see is safe from 'clean room reverse engineering'

Having that full fidelity raw data would be a gold mine, even without instructions. I'm sure the hacker community would reverse engineer it within months.

Reverse engineering.
next

Legal | privacy