Prerequisites
Direct access to the object or software.
Resources Required
Reverse engineering of software requires varying tools and methods that enable the decompiling of executable or other compiled objects.
Related Weaknesses
CWE-ID |
Weakness Name |
|
Improper Management of Sensitive Trace Data Trace data collected from several sources on the
System-on-Chip (SoC) is stored in unprotected locations or
transported to untrusted agents. |
Submission
Name |
Organization |
Date |
Date release |
CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modifications
Name |
Organization |
Date |
Comment |
CAPEC Content Team |
The MITRE Corporation |
2015-11-09 +00:00 |
Updated Activation_Zone, Attack_Prerequisites, Description Summary, Injection_Vector, Payload, Payload_Activation_Impact, Related_Attack_Patterns, Related_Weaknesses, Resources_Required |
CAPEC Content Team |
The MITRE Corporation |
2020-12-17 +00:00 |
Updated Related_Weaknesses |
CAPEC Content Team |
The MITRE Corporation |
2023-01-24 +00:00 |
Updated Related_Weaknesses |