Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,287,220 papers from all fields of science
Search
Sign In
Create Free Account
Decompiler
Known as:
Decompilation
, Decompilers
, Decompile
Expand
A decompiler is a computer program that takes an executable file as input, and attempts to create a high level source file which can be recompiled…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
38 relations
.NET Framework
.NET Reflector
Abstract interpretation
Application programming interface
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Repackaging Android Applications for Auditing Access to Private Data
P. Berthomé
,
Thomas Fécherolle
,
N. Guilloteau
,
Jean-François Lalande
Seventh International Conference on Availability…
2012
Corpus ID: 12222085
One of the most important threats for Android users is the collection of private data by malware put on the market. Most of the…
Expand
2012
2012
Wire -- A Formal Intermediate Language for Binary Analysis
Silvio Cesare
,
Yang Xiang
IEEE 11th International Conference on Trust…
2012
Corpus ID: 3794627
Wire is a intermediate language to enable static program analysis on low level objects such as native executables. It has…
Expand
2009
2009
Using API Sequence and Bayes Algorithm to Detect Suspicious Behavior
Cheng Wang
,
J. Pang
,
Rongcai Zhao
,
Xiaoxian Liu
IASTED International Conference on Communication…
2009
Corpus ID: 16572224
Computer viruses have become the main threat of the safety and security of industry. Unfortunately, no mature products of anti…
Expand
2007
2007
Simple Types in Type Theory: Deep and Shallow Encodings
François Garillot
,
Benjamin Werner
International Conference on Theorem Proving in…
2007
Corpus ID: 17205984
We present a formal treatment of normalization by evaluation in type theory. The involved semantics of simply-typed λ-calculus is…
Expand
2003
2003
Securing Java through software watermarking
D. Curran
,
N. Hurley
,
Mel Ó Cinnéide
Principles and Practice of Programming in Java
2003
Corpus ID: 7283049
An important advantage of Java is its portability due to its use of bytecode. However the use of bytecode allows decompilation of…
Expand
2001
2001
Comparing type-based and proof-directed decompilation
A. Mycroft
,
A. Ohori
,
Shin-ya Katsumata
Proceedings Eighth Working Conference on Reverse…
2001
Corpus ID: 12170301
In the past couple of years interest in decompilation has widened from its initial concentration on reconstruction of control…
Expand
Review
1998
Review
1998
The Manifold Presence of Christ in the Liturgy
Michael G. Witczak
1998
Corpus ID: 59026891
The doctrine of Christ's manifold presence in the liturgy, found in Vatican II's Sacrosanctum concilium no. 7, has a complex…
Expand
1995
1995
Economics of intellectual property protection for software: the proper role for copyright
F. Warren-Boulton
,
Kenneth C. Baseman
,
Glenn Woroch
STAN
1995
Corpus ID: 5790135
This paper provides an economic analysis of the proper role of copyright protection for computer software. We begin by…
Expand
1994
1994
Signatures for Library Functions in Executable Files
M. Emmerik
1994
Corpus ID: 6568309
A method for efficiently generating signatures for detecting library functions in executable files is described. The signatures…
Expand
1982
1982
Decompiling CODASYL DML into retional queries
R. Katz
,
E. Wong
TODS
1982
Corpus ID: 36032656
A “decompilation” algorithm is developed to transform a program written with the procedural operations of CODASYL DML into one…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE