Re-engineering from legacy executable (binary) files is greatly facilitated by identifying and naming statically linked library functions. This paper presents an efficient method for generating files of patterns; each pattern is a transformation of the first several bytes of a library function's executable code. Given a suitable pattern file, a candidate function can be identified in linear time. One pattern file is generated for each combination of compiler vendor, version and memory model (where applicable). The process of identifying these parameters in a given executable file also identifies the main function of the program, i.e. The start of the code written by the user. The pattern files are produced automatically from a compiler's li...
We propose a new method to organize a library of application-graph patterns. Such libraries are empl...
We apply the notion of design patterns to optimizations performed by designers of software libraries...
International audienceThis paper deals with the binary analysis of executable programs, with the goa...
A method for efficiently generating signatures for detecting library functions in executable files i...
Master's thesis describes imported functions detection in PE executables, which are from static libr...
Different software tools, such as decompilers, code quality analyzers, recognizers of packed executa...
Traditionally, execution of a program follows a straight and inflexible path starting from source co...
Generation of program patterns from source code is a difficult, time consuming and error-prone proce...
Raising the level of abstraction is a key concern of software engi-neering, and libraries (either us...
<p>Function identification is a fundamental challenge in reverse engineering and binary program anal...
In the last years, several approaches were proposed to improve embedded systems performance by exten...
Binary-binary function matching problem serves as a plinth in many reverse engineering techniques su...
AbstractThe paper deals with the problem of automatic verification of programs with dynamic linked d...
When a successful software system is maintained and evolved for an extended period of time, original...
The identification of reusable assets in existing systems is an important problem to be solved to sp...
We propose a new method to organize a library of application-graph patterns. Such libraries are empl...
We apply the notion of design patterns to optimizations performed by designers of software libraries...
International audienceThis paper deals with the binary analysis of executable programs, with the goa...
A method for efficiently generating signatures for detecting library functions in executable files i...
Master's thesis describes imported functions detection in PE executables, which are from static libr...
Different software tools, such as decompilers, code quality analyzers, recognizers of packed executa...
Traditionally, execution of a program follows a straight and inflexible path starting from source co...
Generation of program patterns from source code is a difficult, time consuming and error-prone proce...
Raising the level of abstraction is a key concern of software engi-neering, and libraries (either us...
<p>Function identification is a fundamental challenge in reverse engineering and binary program anal...
In the last years, several approaches were proposed to improve embedded systems performance by exten...
Binary-binary function matching problem serves as a plinth in many reverse engineering techniques su...
AbstractThe paper deals with the problem of automatic verification of programs with dynamic linked d...
When a successful software system is maintained and evolved for an extended period of time, original...
The identification of reusable assets in existing systems is an important problem to be solved to sp...
We propose a new method to organize a library of application-graph patterns. Such libraries are empl...
We apply the notion of design patterns to optimizations performed by designers of software libraries...
International audienceThis paper deals with the binary analysis of executable programs, with the goa...