Skip to search formSkip to main contentSkip to account menu

Interactive Disassembler

Known as: Hex-Rays, Ida pro 
The Interactive Disassembler (IDA) is a disassembler for computer software which generates assembly language source code from machine-executable code… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
In this paper, a new method of usage forensics memory analysis for compromising the carrier-lock algorithm was proposed. The… 
2017
2017
As a major threat to cyber security, malware has been increasingly damaging national security. This paper proposes a malware… 
2017
2017
Conventional encryption algorithms are designed to be secure in the “black-box” attack context, i.e. the attacker has access to… 
2015
2015
Prefetch files, like any other file in a file system, can be viewed from a digital forensic perspective to further a forensic… 
2011
2011
2010
2010
Since Sharir and Pnueli, algorithms for context-sensitivity have been defined in terms of ‘valid’ paths in an interprocedural… 
2009
2009
Static analysis is one of the most popular approaches of software analysis. As more and more software protects their code by… 
2007
2007
"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder… 
2005
2005
The continued growth and diversification of the Internet has been accompanied by an increasing prevalence of attacks and… 
1994
1994
A method for efficiently generating signatures for detecting library functions in executable files is described. The signatures…