Wymagania wstępne
Direct access to the object or software.
Wymagane zasoby
Reverse engineering of software requires varying tools and methods that enable the decompiling of executable or other compiled objects.
Powiązane słabości
| CWE-ID |
Nazwa słabości |
|
Improper Management of Sensitive Trace Data Trace data collected from several sources on the
System-on-Chip (SoC) is stored in unprotected locations or
transported to untrusted agents. |
Zgłoszenie
| Nazwa |
Organizacja |
Data |
Data wydania |
| CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modyfikacje
| Nazwa |
Organizacja |
Data |
Komentarz |
| CAPEC Content Team |
The MITRE Corporation |
2015-11-09 +00:00 |
Updated Activation_Zone, Attack_Prerequisites, Description Summary, Injection_Vector, Payload, Payload_Activation_Impact, Related_Attack_Patterns, Related_Weaknesses, Resources_Required |
| CAPEC Content Team |
The MITRE Corporation |
2020-12-17 +00:00 |
Updated Related_Weaknesses |
| CAPEC Content Team |
The MITRE Corporation |
2023-01-24 +00:00 |
Updated Related_Weaknesses |