-
2
-
-
79958700553
-
Disassembly of executable code revisited
-
IEEE Computer Society, Los Alamitos
-
Schwarz, B., Debray, S.K., Andrews, G.R.: Disassembly of executable code revisited. In: 9th Working Conf. Reverse Engineering (WCRE 2002), pp. 45-54. IEEE Computer Society, Los Alamitos (2002)
-
(2002)
9th Working Conf. Reverse Engineering (WCRE
, pp. 45-54
-
-
Schwarz, B.1
Debray, S.K.2
Andrews, G.R.3
-
3
-
-
35048896043
-
-
Balakrishnan, G., Reps, T.W.: Analyzing memory accesses in x86 executables. In: Duester- wald, E. (ed.) CC 2004. LNCS, 2985, pp. 5-23. Springer, Heidelberg (2004)
-
Balakrishnan, G., Reps, T.W.: Analyzing memory accesses in x86 executables. In: Duester- wald, E. (ed.) CC 2004. LNCS, vol. 2985, pp. 5-23. Springer, Heidelberg (2004)
-
-
-
-
4
-
-
58449107065
-
-
Harris, L.C., Miller, B.P.: Practical analysis of stripped binary code. SIGARCH Comput. Archit. News 33(5), 63-68 (2005)
-
Harris, L.C., Miller, B.P.: Practical analysis of stripped binary code. SIGARCH Comput. Archit. News 33(5), 63-68 (2005)
-
-
-
-
5
-
-
0036974913
-
Generic control flow reconstruction from assembly code
-
ACM Press, New York
-
Kastner, D., Wilhelm, S.: Generic control flow reconstruction from assembly code. In: 2002 Jt. Conf. Languages, Compilers, and Tools for Embedded Systems & Software and Compilers for Embedded Systems (LCTES 2002-SCOPES 2002), pp. 46-55. ACM Press, New York (2002)
-
(2002)
2002 Jt. Conf. Languages, Compilers, and Tools for Embedded Systems & Software and Compilers for Embedded Systems (LCTES 2002-SCOPES
, pp. 46-55
-
-
Kastner, D.1
Wilhelm, S.2
-
6
-
-
48949099057
-
-
Kinder, J., Veith, H.: Jakstab: A static analysis platform for binaries. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, 5123, pp. 423-427. Springer, Heidelberg (2008)
-
Kinder, J., Veith, H.: Jakstab: A static analysis platform for binaries. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 423-427. Springer, Heidelberg (2008)
-
-
-
-
7
-
-
31844441420
-
Link-time binary rewriting techniques for program compaction
-
De Sutter, B., De Bus, B., De Bosschere, K.: Link-time binary rewriting techniques for program compaction. ACM Trans. Program. Lang. Syst. 27(5), 882-945 (2005)
-
(2005)
ACM Trans. Program. Lang. Syst
, vol.27
, Issue.5
, pp. 882-945
-
-
De Sutter, B.1
De Bus, B.2
De Bosschere, K.3
-
8
-
-
0026866013
-
Profile-guided automatic inline expansion for C programs
-
Chang, P.P., Mahlke, S.A., Chen, W.Y., Hwu, W.W.: Profile-guided automatic inline expansion for C programs. Softw., Pract. Exper. 22(5), 349-369 (1992)
-
(1992)
Softw., Pract. Exper
, vol.22
, Issue.5
, pp. 349-369
-
-
Chang, P.P.1
Mahlke, S.A.2
Chen, W.Y.3
Hwu, W.W.4
-
9
-
-
0003818126
-
-
Springer, Heidelberg
-
Nielson, F., Nielson, H.R., Hankin, C.: Principles of Program Analysis. Springer, Heidelberg (1999)
-
(1999)
Principles of Program Analysis
-
-
Nielson, F.1
Nielson, H.R.2
Hankin, C.3
-
10
-
-
84972541021
-
A lattice-theoretical fixpoint theorem and its applications
-
Tarski, A.: A lattice-theoretical fixpoint theorem and its applications. Pacific J. Math. 5(2), 285-309 (1955)
-
(1955)
Pacific J. Math
, vol.5
, Issue.2
, pp. 285-309
-
-
Tarski, A.1
-
11
-
-
0029345668
-
Decompilation of binary programs
-
Cifuentes, C., Gough, K.J.: Decompilation of binary programs. Softw., Pract. Exper. 25(7), 811-829 (1995)
-
(1995)
Softw., Pract. Exper
, vol.25
, Issue.7
, pp. 811-829
-
-
Cifuentes, C.1
Gough, K.J.2
-
12
-
-
18144399312
-
Using a decompiler for real-world source recovery
-
IEEE Computer Society Press, Los Alamitos
-
van Emmerik, M., Waddington, T: Using a decompiler for real-world source recovery. In: 11th Working Conf. Reverse Engineering (WCRE 2004), pp. 27-36. IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
11th Working Conf. Reverse Engineering (WCRE
, pp. 27-36
-
-
van Emmerik, M.1
Waddington, T.2
-
13
-
-
33749847859
-
-
Chang, B., Harren, M., Necula, G.: Analysis of low-level code using cooperating decompilers. In: Yi, K. (ed.) SAS 2006. LNCS, 4134, pp. 318-335. Springer, Heidelberg (2006)
-
Chang, B., Harren, M., Necula, G.: Analysis of low-level code using cooperating decompilers. In: Yi, K. (ed.) SAS 2006. LNCS, vol. 4134, pp. 318-335. Springer, Heidelberg (2006)
-
-
-
-
14
-
-
18744400356
-
PLTO: A link-time optimizer for the intel IA-32 architecture
-
Schwarz, B., Debray, S.K., Andrews, G.R.: PLTO: A link-time optimizer for the intel IA-32 architecture. In: Proc. Workshop on Binary Translation, WBT 2001 (2001)
-
(2001)
Proc. Workshop on Binary Translation, WBT
-
-
Schwarz, B.1
Debray, S.K.2
Andrews, G.R.3
-
15
-
-
84947261898
-
Reliable and precise WCET determination for a real-life processor
-
Henzinger, T.A, Kirsch, CM, eds, EMSOFT 2001, Springer, Heidelberg
-
Ferdinand, C., Heckmann, R., Langenbach, M., Martin, F., Schmidt, M., Theiling, H., Thesing, S., Wilhelm, R.: Reliable and precise WCET determination for a real-life processor. In: Henzinger, T.A., Kirsch, CM. (eds.) EMSOFT 2001. LNCS, vol. 2211, pp. 469-485. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2211
, pp. 469-485
-
-
Ferdinand, C.1
Heckmann, R.2
Langenbach, M.3
Martin, F.4
Schmidt, M.5
Theiling, H.6
Thesing, S.7
Wilhelm, R.8
-
17
-
-
0033905645
-
UQBT: Adaptive binary translation at low cost
-
Cifuentes, C., van Emmerik, M.: UQBT: Adaptive binary translation at low cost. IEEE Computer 33(3), 60-66 (2000)
-
(2000)
IEEE Computer
, vol.33
, Issue.3
, pp. 60-66
-
-
Cifuentes, C.1
van Emmerik, M.2
-
18
-
-
26444526878
-
Detecting malicious code by model checking
-
Julisch, K, Krügel, C, eds, DIMVA 2005, Springer, Heidelberg
-
Kinder, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Detecting malicious code by model checking. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 174-187. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3548
, pp. 174-187
-
-
Kinder, J.1
Katzenbeisser, S.2
Schallhart, C.3
Veith, H.4
-
19
-
-
27544433210
-
Semantics-aware malware detection
-
IEEE Computer Society, Los Alamitos
-
Christodorescu, M., Jha, S., Seshia, S.A., Song, D.X., Bryant, R.E.: Semantics-aware malware detection. In: IEEE Symp. Security and Privacy (S&P 2005), pp. 32-46. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
IEEE Symp. Security and Privacy (S&P
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.X.4
Bryant, R.E.5
-
20
-
-
0035400735
-
Recovery of jump table case statements from binary code
-
Cifuentes, C., van Emmerik, M.: Recovery of jump table case statements from binary code. Sci. Comput. Program. 40(2-3), 171-188 (2001)
-
(2001)
Sci. Comput. Program
, vol.40
, Issue.2-3
, pp. 171-188
-
-
Cifuentes, C.1
van Emmerik, M.2
|