2018
DOI: 10.1134/s0361768818030064
|View full text |Cite
|
Sign up to set email alerts
|

On the Representation of Results of Binary Code Reverse Engineering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 10 publications
0
1
0
1
Order By: Relevance
“…If the programmers can imitate other programmers work, then the computer may imitate a given application. The programmer/computer captures the main features of the original software package and builds a new one (using what is called reverse engineering) [1].…”
Section: Secure Source Codementioning
confidence: 99%
“…If the programmers can imitate other programmers work, then the computer may imitate a given application. The programmer/computer captures the main features of the original software package and builds a new one (using what is called reverse engineering) [1].…”
Section: Secure Source Codementioning
confidence: 99%
“…Алгоритм восстановления стека вызовов функций в данной работе не рассматривается. Предполагается, что он уже восстановлен на этапе построения статического представления программы [6,20,46]. На втором, завершающем, этапе будет сформировано множество суперблоков, соединенных между собой ребрами, представляя таким образом гиперграф.…”
Section: алгоритм построения иерархического высокоуровневого представunclassified