Conclusion
Many of us will remember the summer of 2004 as the time when Windows CE lost its innocence. In a matter of a few sultry months, the Pocket PC was repeatedly violated, as malware writers and security experts alike started to demonstrate weaknesses and vulnerabilities in these mobile devices. But while previous malware and proof-of-concept code for Windows CE was created and studied in a controlled environment, Brador was the first malicious program in the wild. By presenting our "black box," step-by-step reverse-engineering analysis, we hope to inspire others to enter the exciting field of Windows CE reverse-engineering.