Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,360,317 papers from all fields of science
Search
Sign In
Create Free Account
Interactive Disassembler
Known as:
Hex-Rays
, Ida pro
The Interactive Disassembler (IDA) is a disassembler for computer software which generates assembly language source code from machine-executable code…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
ARM architecture
Application programming interface
Assembly language
C++
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Method of Forensic Analysis for Compromising Carrier-lock Algorithm on 3G Modem Firmware
V. Zhukovskyy
,
N. Zhukovska
,
A. Vlasyuk
,
Andrii Safonyk
IEEE 2nd Ukraine Conference on Electrical and…
2019
Corpus ID: 204863008
In this paper, a new method of usage forensics memory analysis for compromising the carrier-lock algorithm was proposed. The…
Expand
2017
2017
MCSMGS: Malware Classification Model Based on Deep Learning
Xi Meng
,
Zhen Shan
,
+4 authors
Jing Wang
International Conference on Cyber-Enabled…
2017
Corpus ID: 20634637
As a major threat to cyber security, malware has been increasingly damaging national security. This paper proposes a malware…
Expand
2017
2017
Թափանցիկ ծածկագրության սխեմաների որոշ կիրառություններ
Մ. Ա. Կարապետյան
2017
Corpus ID: 196097718
Conventional encryption algorithms are designed to be secure in the “black-box” attack context, i.e. the attacker has access to…
Expand
2015
2015
Digital Forensic Analysis on Prefetch Files Exploring the Forensic Potential of Prefetch Files in the Windows Platform
N. Shashidhar
,
D. Novak
2015
Corpus ID: 6680530
Prefetch files, like any other file in a file system, can be viewed from a digital forensic perspective to further a forensic…
Expand
2011
2011
Chapter 5 – Mac OS X
Enrico Perla
,
M. Oldani
2011
Corpus ID: 53834645
2010
2010
Context-sensitive analysis without calling-context
Arun Lakhotia
,
D. Boccardo
,
Anshuman Singh
,
A. Manacero
High. Order Symb. Comput.
2010
Corpus ID: 14385080
Since Sharir and Pnueli, algorithms for context-sensitivity have been defined in terms of ‘valid’ paths in an interprocedural…
Expand
2009
2009
ReconBin: Reconstructing Binary File from Execution for Software Analysis
Lingyun Ying
,
Purui Su
,
D. Feng
,
Xianggen Wang
,
Yi Yang
,
Yu Liu
Third IEEE International Conference on Secure…
2009
Corpus ID: 14044894
Static analysis is one of the most popular approaches of software analysis. As more and more software protects their code by…
Expand
2007
2007
Gray Hat Hacking, Second Edition
S. Harris
,
Allen Harper
,
C. Eagle
,
Jonathan Ness
2007
Corpus ID: 61331641
"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder…
Expand
2005
2005
1 An Inside Look at Botnets
P. Barford
,
V. Yegneswaran
2005
Corpus ID: 67807109
The continued growth and diversification of the Internet has been accompanied by an increasing prevalence of attacks and…
Expand
1994
1994
Signatures for Library Functions in Executable Files
M. Emmerik
1994
Corpus ID: 6568309
A method for efficiently generating signatures for detecting library functions in executable files is described. The signatures…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE