This paper aims to present a methodical framework for high-level reverse engineering. The methodology is a culmination of existing tools and techniques within the IT security research community, which presents ways to identify process operation at a higher-level of abstraction than traditional binary reversing.
abcb990c2920f9711a6e32d5fa3b2b47b71fd2a9d56afa4bf284c61f866209d2