Filters








267 Hits in 3.4 sec

Modular Decompilation of Low-Level Code by Partial Evaluation

Miguel Gómez-Zamalloa, Elvira Albert, Germán Puebla
2008 2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation  
This demostrates empirically the scalability of modular decompilation of low-level code by partial evaluation.  ...  Interpretive decompilation consists in partially evaluating an interpreter for the low-level language (written in the high-level language) w.r.t. the code to be decompiled.  ...  Decompilation of Low-Level Languages Applying the interpretive approach on a low-level language introduces new challenges.  ... 
doi:10.1109/scam.2008.35 dblp:conf/scam/Gomez-ZamalloaAP08 fatcat:o75cxvnt2zb6dkzxpibwd4ipsm

Decompilation of Java bytecode to Prolog by partial evaluation

Miguel Gómez-Zamalloa, Elvira Albert, Germán Puebla
2009 Information and Software Technology  
This demonstrates empirically the scalability of modular decompilation of JBC by partial evaluation.  ...  Interpretive decompilation consists in partially evaluating an interpreter for the compiled language (in this case JBC) written in a high-level language w.r.t. the code to be decompiled.  ...  This work was funded in part by the Information Society Technologies program of the European Commission, Future and Emerging Technologies under the IST-15905 MOBIUS and IST-231620 HATS projects, by the  ... 
doi:10.1016/j.infsof.2009.04.010 fatcat:febdvtabvjcyrjcjkfgy4qnmy4

Analysis of Low-Level Code Using Cooperating Decompilers [chapter]

Bor-Yuh Evan Chang, Matthew Harren, George C. Necula
2006 Lecture Notes in Computer Science  
We present a modular framework for building pipelines of cooperating decompilers that gradually lift the level of the language to something appropriate for source-level tools.  ...  Analysis or verification of low-level code is useful for minimizing the disconnect between what is verified and what is actually executed and is necessary when source code is unavailable or is, say, intermingled  ...  In essence, we propose that an easy way to reuse source-level analysis tools for low-level code is to decompile the low-level code to a level appropriate for the tool.  ... 
doi:10.1007/11823230_21 fatcat:55cfwdvmzvgmzclaarzdg4ckgm

dewolf: Improving Decompilation by leveraging User Surveys [article]

Steffen Enders, Eva-Maria C. Behner, Niklas Bergmann, Mariia Rybalka, Elmar Padilla, Er Xue Hui, Henry Low, Nicholas Sim
2022 arXiv   pre-print
Additionally, future decompilers should not necessarily follow the unwritten rule to stick to the code-structure dictated by the assembly in order to produce readable output.  ...  Since the source code of encountered samples is rarely available, analysts regularly employ decompilers for easier and faster comprehension than analyzing a binary's disassembly.  ...  In general, the quality of code can either be evaluated using quantitative measurements, i.e., code metrics, or by conducting user surveys.  ... 
arXiv:2205.06719v1 fatcat:7xmnsqnk65gffe4bp7vevbbrdq

Improving the Decompilation of Java Bytecode to Prolog by Partial Evaluation

Miguel Gómez-Zamalloa, Elvira Albert, Germán Puebla
2007 Electronical Notes in Theoretical Computer Science  
The interpretative approach to compilation allows compiling programs by partially evaluating an interpreter w.r.t. a source program.  ...  We refer to this as the efficiency of the decompilation. With this aim, we propose several techniques for improving the partial evaluation strategy.  ...  Acknowledgments This work was funded in part by the Information Society Technologies program of the European Commission, Future and Emerging Technologies under the IST-15905 MOBIUS project, by the Spanish  ... 
doi:10.1016/j.entcs.2007.02.062 fatcat:xkespgksbzaxrbijm4uuhp366i

Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study

Khaled Yakdan, Sergej Dechand, Elmar Gerhards-Padilla, Matthew Smith
2016 2016 IEEE Symposium on Security and Privacy (SP)  
Decompilation can accelerate this process by enabling analysts to reason about a high-level, more abstract from of binary code.  ...  We evaluate three decompilers: the leading industry decompiler Hex-Rays, the state-of-the-art academic decompiler DREAM, and our usability-optimized decompiler DREAM ++ .  ...  We sincerely thank all the students and experts that agreed to support our research by taking part in our user study.  ... 
doi:10.1109/sp.2016.18 dblp:conf/sp/YakdanDG016 fatcat:5lh4fbkdxng55hcxqxwi7pld6q

A compositional natural semantics and Hoare logic for low-level languages

Ando Saabas, Tarmo Uustalu
2007 Theoretical Computer Science  
It is widely believed that low-level languages with jumps must be difficult to reason about by being inherently non-modular. We argue that this is untrue.  ...  The advent of proof-carrying code has generated significant interest in reasoning about low-level languages.  ...  The lack of modularity is attributed to low-level code being flat and to the prominent presence of completely unrestricted jumps.  ... 
doi:10.1016/j.tcs.2006.12.020 fatcat:e5byfwpczrcafmi4ecjpmzonke

A Compositional Natural Semantics and Hoare Logic for Low-Level Languages

Ando Saabas, Tarmo Uustalu
2006 Electronical Notes in Theoretical Computer Science  
It is widely believed that low-level languages with jumps must be difficult to reason about by being inherently non-modular. We argue that this is untrue.  ...  The advent of proof-carrying code has generated significant interest in reasoning about low-level languages.  ...  The lack of modularity is attributed to low-level code being flat and to the prominent presence of completely unrestricted jumps.  ... 
doi:10.1016/j.entcs.2005.09.031 fatcat:ouwbmut3hrdopfirhjheulvruu

A Modular Worst-case Execution Time Analysis Tool for Java Processors

Trevor Harmon, Martin Schoeberl, Raimund Kirner, Raymond Klefstad
2008 2008 IEEE Real-Time and Embedded Technology and Applications Symposium  
Without knowledge of WCET, the correct temporal behavior of a Java program cannot be guaranteed.  ...  Recognizing this deficiency, we have created an opensource, extensible tool that supports WCET analysis of Java programs.  ...  The paper is organized in a bottom-up fashion, starting with the low-level tools and working up to high-level WCET analysis.  ... 
doi:10.1109/rtas.2008.34 dblp:conf/rtas/HarmonSKK08 fatcat:hnnaheqasff7vozr7qwp2n6wsq

A large study on the effect of code obfuscation on the quality of java code

Mariano Ceccato, Andrea Capiluppi, Paolo Falcarin, Cornelia Boldyreff
2014 Empirical Software Engineering  
The effectiveness of these source code obfuscations has been measured using 10 code metrics, considering modularity, size and complexity of code.  ...  Aim: This paper aims at evaluating and quantifying the effect of several different obfuscation implementations (both open source and commercial), to help developers and project manager to decide which  ...  Acknowledgements The authors would like to thank Marco Torchiano for the interesting discussion on the analysis procedure and the Zelix Klassmaster TM developers for the full evaluation copy of their tool  ... 
doi:10.1007/s10664-014-9321-0 fatcat:yhobczotxvd3rnyftctrd557qi

Obfuscation resilient binary code reuse through trace-oriented programming

Junyuan Zeng, Yangchun Fu, Kenneth A. Miller, Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
This paper introduces trace-oriented programming (TOP), a general framework for generating new software from existing binary code by elevating the low-level binary code to C code with templates and inlined  ...  We have implemented a proof-of-concept of TOP and our evaluation results with a range of benign and malicious software indicate that TOP is able to reconstruct source code from binary execution traces  ...  Miller is supported by a DoD scholorship under contract H98230-12-1-0452. This research is funded by DARPA under contract 12011593.  ... 
doi:10.1145/2508859.2516664 dblp:conf/ccs/ZengFMLZX13 fatcat:3qob5amrfbdhrnk4ugu4p77jdm

Diverse Infrastructure and Architecture for Datacenter and Cloud Resilience

James P. G. Sterbenz, Prasad Kulkarni
2013 2013 22nd International Conference on Computer Communication and Networks (ICCCN)  
Our goal is to defend against attacks by continuing to operate correctly even when part of the infrastructure fails and to substantially raise the difficulty of executing a successful attack by requiring  ...  An important emerging part of the Internet is clouds that provide low-cost configurable computing resources, allowing businesses to reduce their hardware, software, and personnel costs.  ...  First, reconstructing higher-level program information allows our framework to apply a range of low-level diversity transformations that are off-limits to many existing run-time randomisation tools.  ... 
doi:10.1109/icccn.2013.6614125 dblp:conf/icccn/SterbenzK13 fatcat:dkgxfbx6znbrlovx2o75fzaoge

OpenJIT Frontend System: An Implementation of the Reflective JIT Compiler Frontend [chapter]

Hirotaka Ogawa, Kouya Shimura, Satoshi Matsuoka, Fuyuhiko Maruyama, Yukihiko Sohda, Yasunori Kimura
2000 Lecture Notes in Computer Science  
This includes techniques such as selection of compilation strategies, runtime partial evaluation, as well as application-specific idiom recognition.  ...  Such extensions could be implemented as source-level or byte-code level transformations, but some low-level implementations are very difficult or inefficient to support with such higher-level transformations  ...  We especially thank Matt Welsh, who coded parts of OpenJIT during his summer job at Fujitsu. Ole Agesen for discussing various technical issues, etc.  ... 
doi:10.1007/3-540-45046-7_8 fatcat:6gnchsx77rhepilb2fm7dr5hoa

Improving interoperability by encouraging the sharing of interface specifications

Sally Weston
2017 Law, Innovation and Technology  
These involve a modest and doctrinally appropriate amendment to Article 6 of the Software Directive to legitimise the sharing of interface specifications obtained by decompilation and encourage the use  ...  The regulation of interoperability is a balancing act between control by rightsholders and openness of interfaces.  ...  Acknowledgements I wish to thank Stavroula Karapapa, Estelle Derclaye and Roger Brownsword for providing invaluable feedback on an earlier version of this article. The usual disclaimers apply.  ... 
doi:10.1080/17579961.2017.1302695 fatcat:3bjkxdovszgnffx6dz64bq6zwy

Drawing the Boundary between Copyright and Contract: Copyright Preemption of Software License Terms

Maureen A. O'Rourke
1995 Duke law journal  
The public goods problem addressed by copyright law is particularly acute in the case of software. Millions of dollars may be invested in software design and coding.'  ...  source code).  ...  Thus, providers generally try to provide enough high level information to satisfy the requirements of application writers without disclosing low-level kernel detail that discloses much about the implementation  ... 
doi:10.2307/1372890 fatcat:xfb2bnpqmngefgp2ffvah7rkpa
« Previous Showing results 1 — 15 out of 267 results