Analysis of reverse engineering and cyber assaults

[thumbnail of NURGALIYEV_Alibek-THESIS_nosignature.pdf]

Nurgaliyev, Alibek (2023) Analysis of reverse engineering and cyber assaults. Research Master thesis, Victoria University.


The rapid growth of cybercrime poses a significant threat in today’s technological landscape, making cybersecurity a crucial concern for organizations and individuals alike. The shortage of cybersecurity professionals further exacerbates the risks faced by internal infrastructures worldwide. This study focuses on the domains of cyber security, reverse engineering, and encryption algorithms, aiming to address these pressing issues. By conducting a quantitative research method and employing meta-analysis techniques, the research provides an objective analysis and critical evaluation of the research problem. The primary objective of the study is to classify encryption algorithms based on various parameters, including flexibility, key expansion, possible attacks, entropy, and security vulnerabilities. This categorization is crucial for evaluating the effectiveness of different encryption algorithms in diverse applications. Another objective is to investigate methods for preventing information leakage in various fields of application. The study will showcase the process of reverse engineering and techniques to enhance application security. By thoroughly examining reverse engineering practices, vulnerabilities can be identified, and countermeasures can be developed against unauthorized data extraction and information theft. The third objective involves conducting in-depth research on common forms of online criminal activity and analyzing the findings to establish preventive measures. By comprehending these criminal activities and their consequences, effective strategies can be formulated to prevent or mitigate such crimes. This study contributes to the field of cybersecurity by investigating different systems, proposing strategies to prevent information leakage, and exploring encryption algorithms. Additionally, analyzing reverse engineering techniques helps identify vulnerabilities that can be exploited and empowers developers and security experts to fortify their applications. The outcomes of this research have been disseminated through publications and conferences, ensuring that the findings reach a wide audience of experts and researchers. By bridging the gap between theoretical research and practical application, this study enhances the security infrastructure of industries and contributes to creating a more secure and resilient digital ecosystem.

Additional Information

Master of Research

Item type Thesis (Research Master thesis)
Subjects Current > FOR (2020) Classification > 4604 Cybersecurity and privacy
Current > Division/Research > Institute for Sustainable Industries and Liveable Cities
Keywords cybercrime; cybersecurity; reverse engineering; encryption algorithms; information leakage; data encryption
Download/View statistics View download statistics for this item

Search Google Scholar

Repository staff login