Saudi Journal of Engineering and Technology (SJEAT)
Volume-11 | Issue-05 | 398-408
Original Research Article
Comparative Analysis of Static and Dynamic Reverse Engineering of Linux Executables Using Kali Linux
Abiha Abbas, Muhammad Siddique, Areeba Kousar
Published : May 12, 2026
Abstract
Reverse engineering is a foundational technique in cybersecurity that enables analysts to study executable software without access to its source code in order to understand program logic, functionality, and potential security weaknesses. As malicious software and complex applications continue to evolve rapidly, the ability to accurately analyze binary executables has become essential for malware detection, vulnerability assessment, and incident response. This research presents a comprehensive experimental study of both static and dynamic reverse engineering techniques applied to Linux executables within a controlled Kali Linux environment. A sample executable was deliberately developed to mimic real-world application behavior and security-related scenarios. Static analysis was performed without executing the program, employing file identification tools, string extraction methods, and binary disassembly to investigate the executable’s structure, embedded data, and instruction flow. Dynamic analysis involved running the program in a monitored environment and observing runtime behavior through system call tracing, library function monitoring, and interactive debugging. These approaches facilitated a thorough examination of how the executable interacts with the operating system, processes user input, and manages program execution flow. The experimental results show that static analysis offers quick insights into binary composition and potential indicators of sensitive data, whereas dynamic analysis uncovers real-time behavior, functional logic, and hidden execution paths that may be missed by static review alone. Employing both methods in tandem enhances analytical accuracy, reduces the likelihood of incorrect assumptions, and improves the interpretation of software behavior. This study underscores the practical value of reverse engineering techniques for strengthening cybersecurity operations, advancing malware investigation capabilities, and supporting secure software development practices.