Academic literature on the topic 'Decompiler'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Decompiler.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Decompiler"

1

Gusarovs, Konstantins. "An Analysis on Java Programming Language Decompiler Capabilities." Applied Computer Systems 23, no. 2 (December 1, 2018): 109–17. http://dx.doi.org/10.2478/acss-2018-0014.

Full text
Abstract:
Abstract Along with new artifact development, software engineering also includes other tasks. One of these tasks is the reverse engineering of binary artifacts. This task can be performed by using special “decompiler” software. In the present paper, the author performs a comparison of four different Java programming language decompilers that have been chosen based on both personal experience and results of a software developer survey.
APA, Harvard, Vancouver, ISO, and other styles
2

Mikhailov, A. A., and A. E. Hmelnov. "Delphi object files decompiler." Proceedings of the Institute for System Programming of the RAS 29, no. 6 (2017): 105–16. http://dx.doi.org/10.15514/ispras-2017-29(6)-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mihajlenko, Kristina, Mikhail Lukin, and Andrey Stankevich. "A method for decompilation of AMD GCN kernels to OpenCL." Information and Control Systems, no. 2 (April 29, 2021): 33–42. http://dx.doi.org/10.31799/1684-8853-2021-2-33-42.

Full text
Abstract:
Introduction: Decompilers are useful tools for software analysis and support in the absence of source code. They are available for many hardware architectures and programming languages. However, none of the existing decompilers support modern AMD GPU architectures such as AMD GCN and RDNA. Purpose: We aim at developing the first assembly decompiler tool for a modern AMD GPU architecture that generates code in the OpenCL language, which is widely used for programming GPGPUs. Results: We developed the algorithms for the following operations: preprocessing assembly code, searching data accesses, extracting systemvalues, decompiling arithmetic operations and recovering data types. We also developed templates for decompilation of branching operations. Practical relevance: We implemented the presented algorithms in Python as a tool called OpenCLDecompiler, which supports a large subset of AMD GCN instructions. This tool automatically converts disassembled GPGPU code into the equivalent OpenCL code, which reduces the effort required to analyze assembly code.
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Zhiming, Qing Wu, and Kun Qian. "Adabot: Fault-Tolerant Java Decompiler (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 10 (April 3, 2020): 13861–62. http://dx.doi.org/10.1609/aaai.v34i10.7203.

Full text
Abstract:
Reverse Engineering has been an extremely important field in software engineering, it helps us to better understand and analyze the internal architecture and interrealtions of executables. Classical Java reverse engineering task includes disassembly and decompilation. Traditional Abstract Syntax Tree (AST) based disassemblers and decompilers are strictly rule defined and thus highly fault intolerant when bytecode obfuscation were introduced for safety concern. In this work, we view decompilation as a statistical machine translation task and propose a decompilation framework which is fully based on self-attention mechanism. Through better adaption to the linguistic uniqueness of bytecode, our model fully outperforms rule-based models and previous works based on recurrence mechanism.
APA, Harvard, Vancouver, ISO, and other styles
5

Harrand, Nicolas, César Soto-Valero, Martin Monperrus, and Benoit Baudry. "Java decompiler diversity and its application to meta-decompilation." Journal of Systems and Software 168 (October 2020): 110645. http://dx.doi.org/10.1016/j.jss.2020.110645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Gengbiao, Zhengwei Qi, Shiqiu Huang, Kangqi Ni, Yudi Zheng, Walter Binder, and Haibing Guan. "A refined decompiler to generate C code with high readability." Software: Practice and Experience 43, no. 11 (July 13, 2012): 1337–58. http://dx.doi.org/10.1002/spe.2138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Křoustek, Jakub, Fridolín Pokorný, and Dusan Kolář. "A new approach to instruction-idioms detection in a retargetable decompiler." Computer Science and Information Systems 11, no. 4 (2014): 1337–59. http://dx.doi.org/10.2298/csis131203076k.

Full text
Abstract:
Retargetable executable-code decompilation is a one of the most complicated reverse-engineering tasks. Among others, it involves de-optimization of compiler-optimized code. One type of such an optimization is usage of so-called instruction idioms. These idioms are used to produce faster or even smaller executable files. On the other hand, decompilation of instruction idioms without any advanced analysis produces almost unreadable high-level language code that may confuse the user of the decompiler. In this paper, we revisit and extend the previous approach of instruction-idioms detection used in a retargetable decompiler developed within the Lissom project. The previous approach was based on detection of instruction idioms in a very-early phase of decompilation (a front-end part) and it was inaccurate for architectures with a complex instruction set (e.g. Intel x86). The novel approach is based on delaying detection of idioms and reconstruction of code to the later phase (a middleend part). For this purpose, we use the LLVM optimizer and we implement this analysis as a new pass in this tool. According to experimental results, this new approach significantly outperforms the previous approach as well as the other commercial solutions.
APA, Harvard, Vancouver, ISO, and other styles
8

Qasim, Syed Ali, Jared M. Smith, and Irfan Ahmed. "Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems." Forensic Science International: Digital Investigation 33 (July 2020): 301013. http://dx.doi.org/10.1016/j.fsidi.2020.301013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Křoustek, Jakub, and Dusan Kolář. "Context parsing (not only) of the object-file-format description language." Computer Science and Information Systems 10, no. 4 (2013): 1673–701. http://dx.doi.org/10.2298/csis130120071k.

Full text
Abstract:
The very first step of each tool such as linker, disassembler, or debugger is parsing of an input executable or object file. These files are stored in one of the existing object file formats (OFF). Retargetable tools are not limited to any particular target platform and they have to deal with handling of several OFFs. Handling of these formats is similar to parsing of computer languages - both of them have a predefined structure and a list of allowed constructions. However, OFF constructions are heavily mutually interconnected and they create context-sensitive units. In present, there is no generic system, which can be used for OFF description and its effective parsing. In this paper, we propose a formal language that can be used for OFF description. Furthermore, we present a design of a context parser of this language that is based on the formal models. The major advance of this solution is an ability to describe context-sensitive properties on the level of the language itself. This concept is planned to be used in the existing retargetable decompiler developed within the Lissom project. In this project, the language and its parser will be used for an object file parsing and its automatic conversion into the internal uniform file format. It is important to say that the concept of this parser can be utilized within other programming languages.
APA, Harvard, Vancouver, ISO, and other styles
10

Yang, Pin, Huiyu Zhou, Yue Zhu, Liang Liu, and Lei Zhang. "Malware Classification Based on Shallow Neural Network." Future Internet 12, no. 12 (December 2, 2020): 219. http://dx.doi.org/10.3390/fi12120219.

Full text
Abstract:
The emergence of a large number of new malicious code poses a serious threat to network security, and most of them are derivative versions of existing malicious code. The classification of malicious code is helpful to analyze the evolutionary trend of malicious code families and trace the source of cybercrime. The existing methods of malware classification emphasize the depth of the neural network, which has the problems of a long training time and large computational cost. In this work, we propose the shallow neural network-based malware classifier (SNNMAC), a malware classification model based on shallow neural networks and static analysis. Our approach bridges the gap between precise but slow methods and fast but less precise methods in existing works. For each sample, we first generate n-grams from their opcode sequences of the binary file with a decompiler. An improved n-gram algorithm based on control transfer instructions is designed to reduce the n-gram dataset. Then, the SNNMAC exploits a shallow neural network, replacing the full connection layer and softmax with the average pooling layer and hierarchical softmax, to learn from the dataset and perform classification. We perform experiments on the Microsoft malware dataset. The evaluation result shows that the SNNMAC outperforms most of the related works with 99.21% classification precision and reduces the training time by more than half when compared with the methods using DNN (Deep Neural Networks).
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Decompiler"

1

DAVIDSON, ANDREW JOSEPH. "SPADE: SEMANTICALLY PRESERVING ABSTRACT DECOMPILER EXPERIMENT." Thesis, The University of Arizona, 2008. http://hdl.handle.net/10150/190436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Miecznikowski, Jerome. "New algorithms for a java decompiler and their implementation in Soot." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=79050.

Full text
Abstract:
This thesis presents Dava, a Java bytecode to Java source code decompiler built on top of the Soot framework.
The Java Virtual Machine Specification of valid bytecode is much less restrictive than the Java Language Specification of valid Java source programs. For example, bytecode has unstructured control flow, loose local typing, and few restrictions on method modifiers. By contrast, the Java language has highly structured control flow, strong local typing, and many restrictions on its method modifiers. The goal of this thesis was to build a tool that could correctly decompile the widest range of verifiable Java bytecode back into compilable Java source. This includes bytecode coming from other source languages, bytecode that has undergone certain types of obfuscation, and optimized bytecode. To accomplish this goal we created the Structure Encapsulation Tree data structure and a set of new decompiling algorithms.
The algorithms fall into three categories: regular control flow, exceptional control flow, and idioms.
APA, Harvard, Vancouver, ISO, and other styles
3

Eriksson, David. "Designing an object-oriented decompiler : Decompilation support for Interactive Disassembler Pro." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5604.

Full text
Abstract:
Decompilation, or reverse compilation, takes a computer program and produces high-level code that works like the original source code. This makes it easier to understand a computer program when source code is not available. However, there are very few tools for decompilation available today. This report describes the design and implementation of Desquirr, a decompilation plug-in for Interactive Disassembler Pro. Desquirr has an object-oriented design and performs basic decompilation of programs running on Intel x86 processors. The low-level analysis uses knowledge about specialized compiler constructs, called idioms, to perform a more accurate decompilation. Desquirr implements data flow analysis, meaning the conversion from primitive machine code instructions into code in a high-level language. The major part of the data flow analysis is the Register Copy Propagation which builds high-level expressions from primitive instructions. Control flow analysis, meaning to restore high-level language constructs such as if/else and for loops, is not implemented. A high level representation of a piece of machine code contains the same information as an assembly language representation of the same machine code, but in a format that is easier to comprehend. Symbols such as ?*? and ?+? are used in high-level language expressions, compared to instructions such as ?mul? and ?add? in assembly language. Two small test cases which compares decompiled code with assembly language shows promising results in reducing the amount of information needed to comprehend a program.
Dekompilering, eller omvänd kompilering, tar ett datorprogram och omvandlar det till högnivåspråk som fungerar som den ursprungliga källkoden. Detta gör det lättare att förstå ett datorprogram när källkod inte finns tillgänglig. Det finns väldigt få verktyg för dekompilering tillgängliga idag. Den här rapporten beskriver design och implementation av Desquirr, en dekomplator-plugin för Interactive Disassembler Pro. Desquirr har en objekt-orienterad design och utför grundläggande dekompilering av program som kör på Intel x86-processorer.
APA, Harvard, Vancouver, ISO, and other styles
4

Žamberský, Zdeněk. "Zpětný překladač jazyka Java." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2015. http://www.nusl.cz/ntk/nusl-232034.

Full text
Abstract:
The goal was to create decompiler for Java programing language. Decompiler should reconstruct original Java source code from class files, representing its compiled form. First part of thesis focuses on Java langage, its compilation and structure of class file. Then Java Virtual Machine and its instruction set is discussed. After that thesis focuses on decompilation and algoritms designed and used for decompiler realization. Examples of decompiled code are presented.
APA, Harvard, Vancouver, ISO, and other styles
5

Kollár, Jaroslav. "Optimalizace LLVM IR pro účely zpětného překladu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-264955.

Full text
Abstract:
This master's thesis describes the design and implementation of optimizations in the middle-end part of a retargetable decompiler developed by AVG Technologies. The purpose of these optimizations is to improve readability of the produced source code and improve existing optimizations in the back-end part. In the introduction, basic information about reverse engineering and decompilation is provided. Then, a description of state of the retargetable decompiler before this work is given. After that, the main part of this work is presented, which describes the design and implementation of the proposed optimizations. Then, the techniques that were used for testing are described. This description is followed by a summary of the achieved results. The present work is concluded by a discussion of possible future development.
APA, Harvard, Vancouver, ISO, and other styles
6

Macko, Lukáš. "Dekódování binárního kódu do vyšší formy reprezentace." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-264983.

Full text
Abstract:
The thesis deals with reverse techniques in software engineering. It presents practical application of software reverse engineering, used tools and approaches. The topic of instruction decoding is discussed in detail. Two basic methods are presented-linear sweep and recursive descent. Their strengths and weaknesses are highlighted. Subsequently a decompiler developed by AVG Technologies is introduced. The decompiler is retargetable. This feature allows to decompile applications of multiple platforms into various target languages. The aim of  the thesis is to design and implement algorithm for  decoding binary files into high-level representation. The designed algorithm is based on modified recursive descent algorithm, which uses control flow information. In order to achieve more accurate decoding results, symbol table records and other additional information are used. The proposed algorithm was implemented for the AVG Technologies retargetable decompiler. The tests showed that the implemented algorithm improved the function detection in decoded programs. Furthermore, the implemented solution allows to decode files that could not be analysed using the previous version of the decompiler.
APA, Harvard, Vancouver, ISO, and other styles
7

kalle, Sushma. "Semantic-aware Stealthy Control Logic Infection Attack." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2512.

Full text
Abstract:
In this thesis work we present CLIK, a new, automated, remote attack on the control logic of a programmable logic controller (PLC) in industrial control systems. The CLIK attack modifies the control logic running in a remote target PLC automatically to disrupt a physical process. We implement the CLIK attack on a real PLC. The attack is initiated by subverting the security measures that protect the control logic in a PLC. We found a critical (zero-day) vulnerability, which allows the attacker to overwrite password hash in the PLC during the authentication process. Next, CLIK retrieves and decompiles the original logic and injects a malicious logic into it and then, transfers the infected logic back to the PLC. To hide the infection, we propose a virtual PLC that engages the software the virtual PLC intercepts the request and then, responds with the original (uninfected) control logic to the software.
APA, Harvard, Vancouver, ISO, and other styles
8

Matula, Peter. "Rekonstrukce datových typů při zpětném překladu kódu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236191.

Full text
Abstract:
This document describes methods for a reconstruction of data types in the decompilation problem. It defines the concept of reverse engineering and introduces decompiler developed by the Lissom project. It presents existing methods of reconstruction of the simple and complex data types, and explains in detail approaches based on data-flow analysis and analysis of the memory operation offsets. The core of this thesis is the design of a new technique of reconstructing simple and complex data types, suitable for deployment in a retargetable decompiler environment of the Lissom project. Basic principles of the new technique, its implementation and related changes in decompiler and intermediate language are described. The solution is tested and the conclusion discusses the achievements, shortcomings and direction of the further work.
APA, Harvard, Vancouver, ISO, and other styles
9

Ilsoo, Jeon. "LLVM-IR based Decompilation." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1559500021466716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Křoustek, Jakub. "Analýza a převod kódů do vyššího programovacího jazyka." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2009. http://www.nusl.cz/ntk/nusl-236651.

Full text
Abstract:
This paper describes methods and procedures used for code analysis and transformation. It contains basic information of a science discipline called reverse engineering and its use in information technologies. The primary objective is a construction of a generic reverse compiler or decompiler, i.e. tool that can recompile from binary form (optionally from symbolic machine code) to a high level language. This operation is highly dependent on the concrete instruction set and processor architecture. This problem is solved with description of semantic of each instruction by a special language designed for this use. The output is the high level language code and is functionally equivalent to the input. The program is therefore able to work with each instruction set and code written by it can be transformed into the chosen high level language. This proposal is implemented in practice as a part of project Lissom. Generic decompiler is completely new idea. The thesis contains entirely new techniques from theory of compilers and optimizations made by the author.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Decompiler"

1

Weik, Martin H. "decompiler." In Computer Science and Communications Dictionary, 372. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4538.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nolan, Godfrey. "Decompiler Design." In Decompiling Android, 151–74. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4249-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nolan, Godfrey. "Decompiler Implementation." In Decompiling Android, 175–227. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4249-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nolan, Godfrey. "Decompiler Design." In Decompiling Java, 121–57. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0739-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nolan, Godfrey. "Decompiler Implementation." In Decompiling Java, 159–236. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0739-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ďurfina, Lukáš, Jakub Křoustek, Petr Zemek, and Břetislav Kábele. "Accurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract)." In Research in Attacks, Intrusions, and Defenses, 390–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33338-5_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ďurfina, Lukáš, Jakub Křoustek, Petr Zemek, Dušan Kolář, Tomáš Hruška, Karel Masařík, and Alexander Meduna. "Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis." In Communications in Computer and Information Science, 72–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23141-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weik, Martin H. "decompile." In Computer Science and Communications Dictionary, 372. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cifuentes, Cristina. "Structuring decompiled graphs." In Lecture Notes in Computer Science, 91–105. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-61053-7_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nolan, Godfrey. "Protecting Your Source: Strategies for Defeating Decompilers." In Decompiling Java, 79–120. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0739-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Decompiler"

1

"Delphi .NET object file decompiler." In 2015 The 5th International Workshop on Computer Science and Engineering-Information Processing and Control Engineering. WCSE, 2015. http://dx.doi.org/10.18178/wcse.2015.04.033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sateanpattanakul, Siwadol. "Comments recovery approach for Java decompiler." In 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS). IEEE, 2016. http://dx.doi.org/10.1109/icis.2016.7550827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Gengbiao, Zhuo Wang, Ruoyu Zhang, Kan Zhou, Shiqiu Huang, Kangqi Ni, Zhengwei Qi, Kai Chen, and Haibing Guan. "A Refined Decompiler to Generate C Code with High Readability." In 2010 17th Working Conference on Reverse Engineering (WCRE). IEEE, 2010. http://dx.doi.org/10.1109/wcre.2010.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Durfina, Jakub Kroustek, Petr Zemek, and Bretislav Kabele. "Detection and Recovery of Functions and their Arguments in a Retargetable Decompiler." In 2012 19th Working Conference on Reverse Engineering (WCRE). IEEE, 2012. http://dx.doi.org/10.1109/wcre.2012.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yakdan, Khaled, Sergej Dechand, Elmar Gerhards-Padilla, and Matthew Smith. "Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study." In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016. http://dx.doi.org/10.1109/sp.2016.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Korencik, Lukas, Petr Rockai, Henrich Lauko, and Jiri Barnat. "On Symbolic Execution of Decompiled Programs." In 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2020. http://dx.doi.org/10.1109/qrs51102.2020.00044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jaffe, Alan, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, and Bogdan Vasilescu. "Meaningful variable names for decompiled code." In ICSE '18: 40th International Conference on Software Engineering. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3196321.3196330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gussoni, Andrea, Alessandro Di Federico, Pietro Fezzardi, and Giovanni Agosta. "A Comb for Decompiled C Code." In ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3320269.3384766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alharbi, Khalid, and Tom Yeh. "Collect, Decompile, Extract, Stats, and Diff." In MobileHCI '15: 17th International Conference on Human-Computer Interaction with Mobile Devices and Services. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2785830.2785892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hamilton, James, and Sebastian Danicic. "An Evaluation of Current Java Bytecode Decompilers." In 2009 Ninth IEEE International Working Conference on Source Code Analysis and Manipulation. IEEE, 2009. http://dx.doi.org/10.1109/scam.2009.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Decompiler"

1

Lu, Jiquan, and Wenyong Hou. Decompile Program Graph Design and Controlling Flow Analysis. Fort Belvoir, VA: Defense Technical Information Center, May 1995. http://dx.doi.org/10.21236/ada294731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography