期刊文献+

反编译中的复合条件分支识别算法 被引量:2

A Novel Compound Conditions Recognition Algorithm in Decompilation
下载PDF
导出
摘要 首次对复合条件分支编译后的结构进行形式化描述,应用图论方法提出了复合分支网络概念,并在此基础上提出了一种新的识别算法。通过理论分析并采用该算法对多个典型样本进行实验,均显示该算法与现有算法相比,识别正确性有明显改善。 A novel recognition algorithm is proposed. Compared with previous works, the algorithm is deterministic rather than heuristic, and it does not use complicated data structures. The new algorithm is more accurate than typical current approaches; furthermore, the new method has been applied to several real-world binaries, and experimental results validate such theoretical analysis.
出处 《北京大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第1期37-43,共7页 Acta Scientiarum Naturalium Universitatis Pekinensis
基金 国家"863"计划(2006AA01Z402) 电子发展基金(信部运[2006]634号)资助项目
关键词 逆向工程 信息安全 反编译 控制流分析 复合条件分支 reverse engineering information security decompilation control flow analysis compound condition
  • 相关文献

参考文献11

  • 1Cifuentes C. Reverse compilation techniques[PhD thesis]. Brisbane: Queensland University of Technology, School of Computing Science, 1994
  • 2Cifuentes C. Structuring decompiled graphs // Proceedings of the International Conference on Compiler Construction Lecture Notes in Computer Science 1060. Heidelberg Springer Berlin, 1996:91-105
  • 3Moretti E, Chanteperdrix G, Osorio A. New Algorithms for Control-Flow Graph Structuring// Fifth European Conference on Software Maintenance and Reengineering. Washington D C: IEEE Computer Society, 2001 : 184-187
  • 4Reynaud S. Structuring program code. United States Patent 20040154009, 2004
  • 5Allen F E. Control flow analysis. ACM SIGPLAN Notices, 1970, 5(7): 1-19
  • 6Cocke J. Global common subexpression elimination. ACM SIGPLAN Notices, 1970, 5(7): 20-25
  • 7Zhang Fubo, D'Hollander E H. Using Hammock Graphs to Structure Programs. IEEE Transactions on Software Engineering, 2004, 30(4): 231-245
  • 8Stitt G, Guo Zhi, Najjar W, et al. Techniques for synthesizing binaries to an advanced register/memory structure // Proceedings of the 2005 ACM/SIGDA 13^th International Symposium on Field-programmable Gate Arrays. New York: ACM Press, 2005:118-124
  • 9Atallah M J, Chang H. Method and system for tamperproofing software. United States Patent 20060031686, 2006
  • 10Kaspersky K.黑客反汇编揭秘.北京:电子工业出版社,2004:378-385

同被引文献20

  • 1Aho A V,Outhi R,Ullman J D.Compilers:Principles,techniques,and teols[M].[S.l.]:Addison-Wesley Publishing Company,1986:528-533.
  • 2Ryder B G,Paull C.Incremental data-flow analysis algorithms[J].ACM Transitions on Programming Language and System,1988,10(1):1-50.
  • 3Cifuentes C.Inter-procedural data flow decompilation[J].Journal of Programming Languages,1996,4(2):77-99.
  • 4Cifuentes C.Reverse compilation techniques[D].Brisbane:School of Computing Science,Quecnsland University of Technology,1994.
  • 5Moretti E,Chanteperdrix G,Osorio A.New algorithms for controlflow graph structuring[C]//5th European Conference on Software Maintenance and Recngineoring.Washington DC:IEEE Computer Society,2001:184-187.
  • 6Reynaud S.Structuring program code:United States,20040154009[P].2004.
  • 7Chen Shuo,Xu Jun,Kalbarzyk Z T,et al.Security vulnerabilities:From analysis to detection and masking techniques[J].Procecdings of the IEEE,2006,94(2):407-418.
  • 8Eldad Eilam,Elliot Chikofsky.Reversing:逆向工程解密[M].韩琪,译.北京:电子工业出版社,2007:13-46.
  • 9Jose Manuel Rios Fonseca.lnteractive decompilation[D].Portugal:Faculty of Engineering of the University of Porto,2006.
  • 10Huang Hai,Jiang Liehui.A decompilation model based multiple disassemble front-end result[C].Jiaozuo:Proceeding of Information Technology and Environmental System Sciences, 2008: 769-773.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部