This paper aims to present a methodical framework for high-level reverse engineering. The methodology is a culmination of existing tools and techniques within the IT security research community, which presents ways to identify process operation at a higher-level of abstraction than traditional binary reversing.
abcb990c2920f9711a6e32d5fa3b2b47b71fd2a9d56afa4bf284c61f866209d2
Whitepaper entitled "Biologger - A Biometric Keylogger". This paper discusses using a "Biologger" to capture biometric data and replaying the data via man-in-the-middle attacks.
010e9e56816a4de2b35f1a93bdbb54a1d370d7e78a1e3ff111d25a262eecca0e