Reverse-engineering process automation
REVEN-Axion helps analyzing executable binaries by reproducing and automating part of the reverse engineering methodology. Much like an MRI would, REVEN-Axion provides an unprecedented amount of details about the workings of a software, works in a truly non-intrusive manner and does not require source-code access.
Symbolic execution of software
The lowest layers of a piece of software are, by design, ignored by source-code analysis, and as such are of high interest to hackers. REVEN-Axion automates what is still a very tedious process, and helps significantly save time when analyzing binaries: it runs a software along with the whole machine context on its own symbolic CPU and performs its analysis process at the same time, almost at a hardware level - which helps gain a better understanding of those sensitive software layers.
Reliability and advanced security
REVEN-Axion's target audience is composed of reverse-engineering experts: analysts of malware or hostile binary analysts, zero-days exploits, or any software without source code.
REVEN-Axion is a collaborative solution, just like any other REVEN® technology. Multiple engineers can work together and analyze a same project, share notes and results, etc.
REVEN-Axion is a front-end to the REVEN® analysis engine. Its UI provides various widgets: for instance here we see a graph of interactions between software components.
REVEN-Axion enables backward analysis, for instance here it knows about every memory accesses (on a physical level) that happened previously, and provides multiple forward or backward tainters. We can also see how it provides semantic information about the MS Windows system being executed.
REVEN-Axion is extensible through plugins: it provides a Python API to enable its users tweak its behavior or to retrieve, manipulate or extrapolate data as they need.