Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,798,538 papers from all fields of science
Search
Sign In
Create Free Account
Interactive Disassembler
Known as:
Hex-Rays
, Ida pro
The Interactive Disassembler (IDA) is a disassembler for computer software which generates assembly language source code from machine-executable code…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
ARM architecture
Application programming interface
Assembly language
C++
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
VMAttack: Deobfuscating Virtualization-Based Packed Binaries
Anatoli Kalysch
,
J. Götzfried
,
Tilo Müller
ARES
2017
Corpus ID: 7759690
We present VMAttack, a deobfuscation tool for virtualization-packed binaries based on automated static and dynamic analysis…
Expand
2014
2014
Shingled Graph Disassembly: Finding the Undecideable Path
R. Wartell
,
Yan Zhou
,
Kevin W. Hamlen
,
Murat Kantarcioglu
Pacific-Asia Conference on Knowledge Discovery…
2014
Corpus ID: 1830100
A probabilistic finite state machine approach to statically disassembling x86 machine language programs is presented and…
Expand
Highly Cited
2013
Highly Cited
2013
Firmware modification attacks on programmable logic controllers
Zachry Basnight
,
J. Butts
,
Juan Lopez
,
Thomas E. Dube
Int. J. Crit. Infrastructure Prot.
2013
Corpus ID: 11432564
2013
2013
BISTRO: Binary Component Extraction and Embedding for Software Security Applications
Zhui Deng
,
X. Zhang
,
Dongyan Xu
European Symposium on Research in Computer…
2013
Corpus ID: 14764941
In software security and malware analysis, researchers often need to directly manipulate binary program – benign or malicious…
Expand
Highly Cited
2012
Highly Cited
2012
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Alexios Mylonas
,
D. Gritzalis
Computers & security
2012
Corpus ID: 35936651
CNIT 126 Policy Instructor Sam Bowne Web Site: samsclass.info E-mail: sbowne@ccsf.edu Text Practical Malware Analysis: The Hands…
Expand
2010
2010
Experiences in Malware Binary Deobfuscation
Hassen Säıdi
,
Phillip A. Porras
,
V. Yegneswaran
2010
Corpus ID: 15552623
Malware authors employ a myriad of evasion techniques to impede automated reverse engineering and static analysis efforts. The…
Expand
Highly Cited
2008
Highly Cited
2008
Jakstab: A Static Analysis Platform for Binaries
Johannes Kinder
,
H. Veith
International Conference on Computer Aided…
2008
Corpus ID: 223800
For processing compiled code, model checkers require accurate model extraction from binaries. We present our fully configurable…
Expand
Highly Cited
2007
Highly Cited
2007
Binary Obfuscation Using Signals
I. V. Popov
,
S. Debray
,
G. Andrews
USENIX Security Symposium
2007
Corpus ID: 1563249
Reverse engineering of software is the process of recovering higher-level structure and meaning from a lower-level program…
Expand
2006
2006
All your private keys are belong to us Extracting RSA private keys and certificates out of the process memory
Tobias Klein
2006
Corpus ID: 16717139
This paper discusses a method to find and extract RSA private keys and certificates out of the process memory in a very reliable…
Expand
Highly Cited
2005
Highly Cited
2005
Graph-based comparison of Executable Objects ( English Version )
T. Dullien
,
R. Rolles
2005
Corpus ID: 18732669
Résumé A method to construct an optimal isomorphism between the sets of instructions, sets of basic blocks and sets of functions…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE