This work deals with extension of a tool for executable-files analysis, which is a~part of a retargetable decompiler developed within the Lissom project. This thesis has two main goals. Firstly, it is necessary to analyze the original implementation of this tool and to find its drawbacks. Secondly, we have to implement a whole new tool without the lacks of its predecessor. This solution must be a full-featured analyzer of executable files. Within this thesis, we also focus on accuracy of compiler and packer detection. Among others, this task is achieved by using special heuristics technics of detection that can also recognize polymorphic packers. In the conclusion, the achieved results of this work and their contribution for the retargetabl...
Abstract — The attackers do not want their Malicious software (or malwares) to be reviled by anti-vi...
The thesis deals with reverse techniques in software engineering. It presents practical application ...
Malware is any software designed to harm computers. Com-mercial anti-virus are based on signature sc...
This thesis deals with the tool for decompilation of binary code into a higher level language, which...
Executable files packing is a process used for compression or protection of these files. The behavio...
This thesis deals with extension of an open-source decompiler project called RetDec maintained by th...
As a part of the Lissom project, a retargetable decompiler is being developed. Its main purpose is t...
The objective of this work is a creation of compiler detector. This program can recognize compiler o...
Packing algorithms are broadly used to avoid anti-malware systems, and the proportion of packed malw...
As a part of the Lissom project, a retargetable decompiler is being developed. Its main purpose is t...
Malware authors invent new methods regularly to hide and obfuscate their code. One of these methods ...
Decompiler is a reverse engineering tool for translation of binary codes into one of the higher leve...
This bachelor's thesis describes the design and implementation of optimizations in the retargetable ...
This document describes methods for a reconstruction of data types in the decompilation problem. It ...
The DoD relies on over seven million computing devices worldwide to accomplish a wide range of goals...
Abstract — The attackers do not want their Malicious software (or malwares) to be reviled by anti-vi...
The thesis deals with reverse techniques in software engineering. It presents practical application ...
Malware is any software designed to harm computers. Com-mercial anti-virus are based on signature sc...
This thesis deals with the tool for decompilation of binary code into a higher level language, which...
Executable files packing is a process used for compression or protection of these files. The behavio...
This thesis deals with extension of an open-source decompiler project called RetDec maintained by th...
As a part of the Lissom project, a retargetable decompiler is being developed. Its main purpose is t...
The objective of this work is a creation of compiler detector. This program can recognize compiler o...
Packing algorithms are broadly used to avoid anti-malware systems, and the proportion of packed malw...
As a part of the Lissom project, a retargetable decompiler is being developed. Its main purpose is t...
Malware authors invent new methods regularly to hide and obfuscate their code. One of these methods ...
Decompiler is a reverse engineering tool for translation of binary codes into one of the higher leve...
This bachelor's thesis describes the design and implementation of optimizations in the retargetable ...
This document describes methods for a reconstruction of data types in the decompilation problem. It ...
The DoD relies on over seven million computing devices worldwide to accomplish a wide range of goals...
Abstract — The attackers do not want their Malicious software (or malwares) to be reviled by anti-vi...
The thesis deals with reverse techniques in software engineering. It presents practical application ...
Malware is any software designed to harm computers. Com-mercial anti-virus are based on signature sc...