2013
DOI: 10.15546/aeei-2013-0049
|View full text |Cite
|
Sign up to set email alerts
|

Generic Detection and Annotations of the Statically Linked Code

Abstract: Detection of the statically linked code is one of the important steps in a process of decompilation. It restricts a code, which can be skipped by the decompiler. Type annotations provide an additional information about the number, types, and suitable names for arguments and return values of recognized functions in recognized statically linked code. This is important for generation of calls for these functions. The detection is based on the generic signatures, which are created from the static libraries. The si… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…On average, ASMBoom outperforms other decompilers. It demonstrates that graph isomorphism based intrinsic function reduction technique is more efficient than the F.L.I.R.T method which is used in Hex-Rays decompiler and the method used in RD [31]. Hex-Rays sometimes misinterpret some intrinsic function like code segment as intrinsic function, especially on the memset intrinsic function.…”
Section: Discussionmentioning
confidence: 99%
“…On average, ASMBoom outperforms other decompilers. It demonstrates that graph isomorphism based intrinsic function reduction technique is more efficient than the F.L.I.R.T method which is used in Hex-Rays decompiler and the method used in RD [31]. Hex-Rays sometimes misinterpret some intrinsic function like code segment as intrinsic function, especially on the memset intrinsic function.…”
Section: Discussionmentioning
confidence: 99%
“…Deadcode insertion is done by inserting a block of code that will never be reached so that it will never be executed but will increase the code size and the analysis time [5]. Code transposition, which is included in layout obfuscation, is done by changing the identifier, changing the format, or deleting comments [6]. String encryption is done by hiding strings that are considered to contain sensitive information using symmetric encryption algorithms such as DES, AES, or XOR [5].…”
Section: Introductionmentioning
confidence: 99%