An approach to the problem of detranslation of computer programs (original) (raw)

Disassembly of Executable Code Revisited

Benjamin Schwarz

2002

View PDFchevron_right

An approach towards disassembly of malicious binary executables

BUNTY AGRAWAL

2004

View PDFchevron_right

Analysis of disassembled executable codes by abstract interpretation

mohammad hadi Alaeiyan

International Journal of Nonlinear Analysis and Applications, 2019

View PDFchevron_right

BIRD: Binary Interpretation using Runtime Disassembly

Lap Chung Lam

International Symposium on Code Generation and Optimization (CGO'06)

View PDFchevron_right

Automatic Reverse Engineering of Data Structures from Binary Execution

Varun Kumar

View PDFchevron_right

On Symbolic Execution of Decompiled Programs (S)

Henrich Lauko

2020

View PDFchevron_right

DERIVE: A Tool That Automatically Reverse-Engineers Instruction Encodings

Dawson Engler, Wilson Hsieh

View PDFchevron_right

Reverse engineering of assembler programs: a model-based approach and its logical basis

Tom Lake

Proceedings of WCRE '96: 4rd Working Conference on Reverse Engineering

View PDFchevron_right

Instructions-Based Detection of Sophisticated Obfuscation and Packing

Moustafa Saleh

2014 IEEE Military Communications Conference, 2014

View PDFchevron_right

An experimentation framework for evaluating disassembly and decompilation tools for C++ and java

Lori Vinciguerra

10th Working Conference on Reverse Engineering, 2003. WCRE 2003. Proceedings., 2003

View PDFchevron_right

Program obfuscation

Bruno De Bus

Proceedings of the 2007 ACM workshop on Quality of protection - QoP '07, 2007

View PDFchevron_right

N-version disassembly

Danilo Bruschi

Proceedings of the 19th international symposium on Software testing and analysis - ISSTA '10, 2010

View PDFchevron_right

A practical program transformation system for reverse engineering

Martin Ward

[1993] Proceedings Working Conference on Reverse Engineering, 2000

View PDFchevron_right

Binary Code Extraction and Interface Identification for Security Applications

Juan Caballero

2009

View PDFchevron_right

A New Model of Program Dependences for Reverse Engineering

Daniel Jackson

ACM Sigsoft Software Engineering Notes, 1994

View PDFchevron_right

QSynth - A Program Synthesis based approach for Binary Code Deobfuscation

mariano ceccato

Proceedings 2020 Workshop on Binary Analysis Research, 2020

View PDFchevron_right

A System to Automatically Analyze Assembled Programs

Angel Osorio

IEEE Transactions on Software Engineering, 2000

View PDFchevron_right

Component Identification Through Program Slicing

Nuno Rodrigues

Electronic Notes in Theoretical Computer Science, 2006

View PDFchevron_right

A Venture and Adventure into Decompilation of Self-Modifying Code

Gregory Morse

View PDFchevron_right

TIE: Principled reverse engineering of types in binary programs

Thanassis Avgerinos

2011

View PDFchevron_right

Automatic extraction of function bodies from software binaries

Gokhan Memik

Proceedings of the 2005 conference on Asia South Pacific design automation - ASP-DAC '05, 2005

View PDFchevron_right

Unscheduling, unpredication, unspeculation: Reverse engineering Itanium executables

Noah Snavely

2003

View PDFchevron_right

Obfuscation-Resilient Executable Payload Extraction From Packed Malware

jiang ming

2021

View PDFchevron_right

Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis

Tomas Hruska, Dusan Kolar

… Security and Assurance, 2011

View PDFchevron_right

Reuse-oriented reverse engineering of functional components from x86 binaries

Hiralal Agrawal

Proceedings of the 36th International Conference on Software Engineering - ICSE 2014, 2014

View PDFchevron_right

Unpredication, unscheduling, unspeculation: reverse engineering Itanium executables

Noah Snavely

2005

View PDFchevron_right

Program and interface slicing for reverse engineering

David Eichmann

[1993] Proceedings Working Conference on Reverse Engineering, 1993

View PDFchevron_right

Adapting Call-string Approach for x86 Obfuscated Binaries

Davidson Boccardo

View PDFchevron_right

Context-sensitive analysis of obfuscated x86 executables

Aleardo Manacero

Proceedings of the …, 2010

View PDFchevron_right

ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation

Michele Carminati

Lecture Notes in Computer Science, 2018

View PDFchevron_right

Towards a framework for algorithm recognition in binary code

Wim Vanhoof

Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming - PPDP '16, 2016

View PDFchevron_right

SATURN - Software Deobfuscation Framework Based On LLVM

Peter Garba

Proceedings of the 3rd ACM Workshop on Software Protection, 2019

View PDFchevron_right