The objective of this work is a creation of compiler detector. This program can recognize compiler or modifier used for application creation. PE and ELF executable file formats are supported. This task is solved by searching for compilers´ signature, which represents compiler-specific starting routine in the file. This work is created as a part of the project Lissom
Traditionally, compilers available to the software developer/tester have only supported two software...
Compiler provenance encompasses numerous pieces of information, such as the compiler family, compile...
Subject of Research.The need for slowdown of the increasing number of vulnerabilities caused by inst...
Program build information, such as compilers and li-braries used, is vitally important in an auditin...
Master's thesis describes imported functions detection in PE executables, which are from static libr...
A method for efficiently generating signatures for detecting library functions in executable files i...
This work deals with extension of a tool for executable-files analysis, which is a~part of a retarge...
This thesis concerns the issue of completness detection of instruction set description for the LLVM ...
To date, most clone detection techniques have concentrated on various forms of source code analysis,...
This thesis deals with the tool for decompilation of binary code into a higher level language, which...
This paper presents a technique to derive and implement error detectors to protect an application fr...
Abstract—In any programming language source code, the code that is repeated is called the clone. The...
This thesis discusses an application of the fuzz testing method for testing compilers and interprete...
Third party libraries used in applications pose an invisible risk for customers using these applicat...
We present Protagoras, a new plug-in architecture for the GNU compiler collection that allows one to...
Traditionally, compilers available to the software developer/tester have only supported two software...
Compiler provenance encompasses numerous pieces of information, such as the compiler family, compile...
Subject of Research.The need for slowdown of the increasing number of vulnerabilities caused by inst...
Program build information, such as compilers and li-braries used, is vitally important in an auditin...
Master's thesis describes imported functions detection in PE executables, which are from static libr...
A method for efficiently generating signatures for detecting library functions in executable files i...
This work deals with extension of a tool for executable-files analysis, which is a~part of a retarge...
This thesis concerns the issue of completness detection of instruction set description for the LLVM ...
To date, most clone detection techniques have concentrated on various forms of source code analysis,...
This thesis deals with the tool for decompilation of binary code into a higher level language, which...
This paper presents a technique to derive and implement error detectors to protect an application fr...
Abstract—In any programming language source code, the code that is repeated is called the clone. The...
This thesis discusses an application of the fuzz testing method for testing compilers and interprete...
Third party libraries used in applications pose an invisible risk for customers using these applicat...
We present Protagoras, a new plug-in architecture for the GNU compiler collection that allows one to...
Traditionally, compilers available to the software developer/tester have only supported two software...
Compiler provenance encompasses numerous pieces of information, such as the compiler family, compile...
Subject of Research.The need for slowdown of the increasing number of vulnerabilities caused by inst...