REVERSE ENGINEERING AND GENERATIVE AI: REBUILDING THE CODE TO UNDERSTAND THE ENEMY
PDF (Portuguese)

Keywords

Reverse engineering. Generative artificial intelligence. Cybersecurity. Adversarial learning. Computational ethics.

How to Cite

Marcos Borges Paes, T. ., & Nicolás Isnardi Begot, F. . (2025). REVERSE ENGINEERING AND GENERATIVE AI: REBUILDING THE CODE TO UNDERSTAND THE ENEMY. Journal of Interdisciplinary Debates, 6(04), 133-145. https://doi.org/10.51249/jid.v6i04.2739

Abstract

The rise of generative artificial intelligence has transformed how computer systems are designed, tested, and understood. In the field of cybersecurity, this revolution reconfigures the role of reverse engineering, which ceases to be merely a technical decoding process and becomes a cognitive practice of intelligent reconstruction. This article analyzes the theoretical and investigative use of reverse engineering associated with generative AI as an instrument for behavioral analysis and adversarial learning—not only to dismantle malicious code but also to understand the logics that produce it. From an interdisciplinary approach, it discusses how generative models (such as deep neural networks and autonomous agents) can reproduce and simulate threats, allowing researchers and analysts to explore the inner workings of software and algorithms from an epistemological perspective. The study also proposes a conceptual model that integrates engineering, cognition, and digital ethics, aligned with the demands of the information age and contemporary cyber defense guidelines. The results indicate that the integration between reverse engineering and generative artificial intelligence represents a new research paradigm, capable of uniting technical reconstruction and ethical reflection in understanding and addressing digital threats.

PDF (Portuguese)

References

BARDIN, Laurence. Análise de conteúdo. Lisboa: Edições 70, 2016.

CASTELLS, Manuel. Sociedade em rede. 19. ed. São Paulo: Paz e Terra, 2020.

GIL, Antonio Carlos. Métodos e técnicas de pesquisa social. 7. ed. São Paulo: Atlas, 2019.

GOODFELLOW, Ian; BENGIO, Yoshua; COURVILLE, Aaron. Deep Learning. Cambridge: MIT Press, 2016.

GOODFELLOW, Ian et al. Explaining and Harnessing Adversarial Examples. In: International Conference on Learning Representations (ICLR). San Diego: ICLR, 2015.

HARARI, Yuval Noah. Inteligência Artificial e o Futuro da Humanidade. Londres: Harvill Secker, 2023.

LAKATOS, Eva Maria; MARCONI, Marina de Andrade. Fundamentos de metodologia científica. 9. ed. São Paulo: Atlas, 2020.

LÉVY, Pierre. Cibercultura. 4. ed. São Paulo: Editora 34, 2019.

MENDONÇA, Eudes Danilo da Silva. Implementação de um Dashboard baseado no CVE MITRE para análise e correções de vulnerabilidades. Dissertação (Mestrado em Computação Aplicada) – Universidade Federal do Pará, Tucuruí, 2023.

MITRE. ATT&CK® Framework – Adversarial Tactics, Techniques, and Common Knowledge. McLean: The MITRE Corporation, 2023. Disponível em: https://attack.mitre.org/. Acesso em: 10 nov. 2025.

MORIN, Edgar. O método 6: ética. Porto Alegre: Sulina, 2015.

PAES, Tadeu Marcos Borges. Singularidade Tecnológica Educacional: O Salto Temporal – Uma Revolução Inevitável. Belém: AlphaNexus Academy, 2025.

SIEMENS, George. Conectivismo: uma teoria de aprendizagem para a era digital. Porto Alegre: Penso, 2021.