Assignment title: Information
Discuss the use of software reverse engineering techniques as a component of incident response.Describe the role of automation in software reverse engineering. Describe the role of static and dynamic analysis in the examination of unknown binaries. Compare different types of obfuscation and deobfuscation techniques in common use.Assignment BriefPrepare an essay outlining changes in reverse engineering methodology over the past two decades. Provide specific focus on the trend away from static analysis towards automated dynamic analysis and the market demands that have driven such change. When structuring your argument consider the implications of advancing obfuscation techniques as they relate to analysis workload. Write the role of automation.Your report must be between 2000 and 4000 words, excluding references, table of contents, cover page, etc.