Analysis Ofreverseengineeringand Cyberassaults