Binary recompiler

Known as: Static binary rewriting, Dynamic binary rewriting, Binary rewriting 
A binary recompiler is a computer program that takes executable binary files as input, analyzes their structure, applies transformations and… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2002-2016
012320022016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Static binary rewriting has many important applications in reverse engineering, such as patching, code reuse, and instrumentation… (More)
  • figure 1
  • table I
  • figure 2
  • table II
  • table III
Is this relevant?
2016
2016
Binary analysis, which analyzes machine code, requires a decoder for converting bits into abstract syntax of machine instructions… (More)
  • figure 3
Is this relevant?
2013
2013
Binary rewriting is the process of transforming executables by maintaining the original binary's functionality, while improving… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2011
2011
Memory access instrumentation is fundamental to many applications such as software transactional memory systems, profiling tools… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2010
2010
Binary rewriting softwares transform executables by maintaining the original binary’s functionality, while improving it in one or… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2008
2008
Setting up generic and fully transparent distributed services for clusters implies complex and tedious kernel developments. More… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
2006
2006
This paper deals with some of the issues that arise in the context of binary rewriting and instrumentation of an operating system… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
Buffer overflow vulnerabilities are one of the most commonly and widely exploited security vulnerabilities in programs. Most… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2006
2006
Binary rewriting techniques have been developed to allow users to enforce security policies directly on mobile code. However, the… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • table 1
Is this relevant?
2002
2002
A software cache implements instruction and data caching entirely in software. Dynamic binary rewriting offers a means to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?