Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,182,831 papers from all fields of science
Search
Sign In
Create Free Account
Decompiler
Known as:
Decompilation
, Decompilers
, Decompile
Expand
A decompiler is a computer program that takes an executable file as input, and attempts to create a high level source file which can be recompiled…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
38 relations
.NET Framework
.NET Reflector
Abstract interpretation
Application programming interface
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
What You Get Is What You See: A Visual Markup Decompiler
Yuntian Deng
,
A. Kanervisto
,
Alexander M. Rush
arXiv.org
2016
Corpus ID: 342657
Building on recent advances in image caption generation and optical character recognition (OCR), we present a general-purpose…
Expand
Highly Cited
2013
Highly Cited
2013
Malwise—An Effective and Efficient Classification System for Packed and Polymorphic Malware
Silvio Cesare
,
Y. Xiang
,
Wanlei Zhou
IEEE transactions on computers
2013
Corpus ID: 3844961
Signature-based malware detection systems have been a much used response to the pervasive problem of malware. Identification of…
Expand
Highly Cited
2008
Highly Cited
2008
From the bitstream to the netlist
Jean-Baptiste Note
,
Éric Rannaud
Symposium on Field Programmable Gate Arrays
2008
Corpus ID: 17710542
This poster presents an in-depth analysis of the Xilinx bitstream file format. This theoretical analysis is backed by a simple…
Expand
2005
2005
Rule extraction as a formal method for the verification and validation of neural networks
Brian J. Taylor
,
Marjorie Darrah
Proceedings. IEEE International Joint Conference…
2005
Corpus ID: 7368026
The term formal method refers to the use of techniques from formal logic and discrete math in the specification, design, and…
Expand
Highly Cited
2004
Highly Cited
2004
Warp Processors
Roman L. Lysecky
,
G. Stitt
,
F. Vahid
ACM Trans. Design Autom. Electr. Syst.
2004
Corpus ID: 15549802
We describe a new processing architecture, known as a warp processor, that utilizes a field-programmable gate array (FPGA) to…
Expand
Highly Cited
2004
Highly Cited
2004
Using hammock graphs to structure programs
Fubo Zhang
,
E. D'Hollander
IEEE Transactions on Software Engineering
2004
Corpus ID: 6844898
Advanced computer architectures rely mainly on compiler optimizations for parallelization, vectorization, and pipelining…
Expand
Highly Cited
2004
Highly Cited
2004
Advanced obfuscation techniques for Java bytecode
J. Chan
,
Wuu Yang
Journal of Systems and Software
2004
Corpus ID: 17204233
Highly Cited
2003
Highly Cited
2003
Obfuscation of executable code to improve resistance to static disassembly
C. Linn
,
S. Debray
Conference on Computer and Communications…
2003
Corpus ID: 8864003
A great deal of software is distributed in the form of executable code. The ability to reverse engineer such executables can…
Expand
Highly Cited
1998
Highly Cited
1998
Manufacturing cheap, resilient, and stealthy opaque constructs
C. Collberg
,
C. Thomborson
,
Douglas Low
ACM-SIGACT Symposium on Principles of Programming…
1998
Corpus ID: 207221323
It has become common to distribute software in forms that are isomorphic to the original source code. An important example is…
Expand
Highly Cited
1998
Highly Cited
1998
Breaking abstractions and unstructuring data structures
C. Collberg
,
C. Thomborson
,
Douglas Low
Proceedings of the International Conference on…
1998
Corpus ID: 3258795
To ensure platform independence, mobile programs are distributed in forms that are isomorphic to the original source code. Such…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE