Academic literature on the topic 'Decompiler'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Decompiler.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Decompiler"
Gusarovs, Konstantins. "An Analysis on Java Programming Language Decompiler Capabilities." Applied Computer Systems 23, no. 2 (December 1, 2018): 109–17. http://dx.doi.org/10.2478/acss-2018-0014.
Full textMikhailov, A. A., and A. E. Hmelnov. "Delphi object files decompiler." Proceedings of the Institute for System Programming of the RAS 29, no. 6 (2017): 105–16. http://dx.doi.org/10.15514/ispras-2017-29(6)-5.
Full textMihajlenko, Kristina, Mikhail Lukin, and Andrey Stankevich. "A method for decompilation of AMD GCN kernels to OpenCL." Information and Control Systems, no. 2 (April 29, 2021): 33–42. http://dx.doi.org/10.31799/1684-8853-2021-2-33-42.
Full textLi, Zhiming, Qing Wu, and Kun Qian. "Adabot: Fault-Tolerant Java Decompiler (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 10 (April 3, 2020): 13861–62. http://dx.doi.org/10.1609/aaai.v34i10.7203.
Full textHarrand, Nicolas, César Soto-Valero, Martin Monperrus, and Benoit Baudry. "Java decompiler diversity and its application to meta-decompilation." Journal of Systems and Software 168 (October 2020): 110645. http://dx.doi.org/10.1016/j.jss.2020.110645.
Full textChen, Gengbiao, Zhengwei Qi, Shiqiu Huang, Kangqi Ni, Yudi Zheng, Walter Binder, and Haibing Guan. "A refined decompiler to generate C code with high readability." Software: Practice and Experience 43, no. 11 (July 13, 2012): 1337–58. http://dx.doi.org/10.1002/spe.2138.
Full textKřoustek, Jakub, Fridolín Pokorný, and Dusan Kolář. "A new approach to instruction-idioms detection in a retargetable decompiler." Computer Science and Information Systems 11, no. 4 (2014): 1337–59. http://dx.doi.org/10.2298/csis131203076k.
Full textQasim, Syed Ali, Jared M. Smith, and Irfan Ahmed. "Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems." Forensic Science International: Digital Investigation 33 (July 2020): 301013. http://dx.doi.org/10.1016/j.fsidi.2020.301013.
Full textKřoustek, Jakub, and Dusan Kolář. "Context parsing (not only) of the object-file-format description language." Computer Science and Information Systems 10, no. 4 (2013): 1673–701. http://dx.doi.org/10.2298/csis130120071k.
Full textYang, Pin, Huiyu Zhou, Yue Zhu, Liang Liu, and Lei Zhang. "Malware Classification Based on Shallow Neural Network." Future Internet 12, no. 12 (December 2, 2020): 219. http://dx.doi.org/10.3390/fi12120219.
Full textDissertations / Theses on the topic "Decompiler"
DAVIDSON, ANDREW JOSEPH. "SPADE: SEMANTICALLY PRESERVING ABSTRACT DECOMPILER EXPERIMENT." Thesis, The University of Arizona, 2008. http://hdl.handle.net/10150/190436.
Full textMiecznikowski, Jerome. "New algorithms for a java decompiler and their implementation in Soot." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=79050.
Full textThe Java Virtual Machine Specification of valid bytecode is much less restrictive than the Java Language Specification of valid Java source programs. For example, bytecode has unstructured control flow, loose local typing, and few restrictions on method modifiers. By contrast, the Java language has highly structured control flow, strong local typing, and many restrictions on its method modifiers. The goal of this thesis was to build a tool that could correctly decompile the widest range of verifiable Java bytecode back into compilable Java source. This includes bytecode coming from other source languages, bytecode that has undergone certain types of obfuscation, and optimized bytecode. To accomplish this goal we created the Structure Encapsulation Tree data structure and a set of new decompiling algorithms.
The algorithms fall into three categories: regular control flow, exceptional control flow, and idioms.
Eriksson, David. "Designing an object-oriented decompiler : Decompilation support for Interactive Disassembler Pro." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5604.
Full textDekompilering, eller omvänd kompilering, tar ett datorprogram och omvandlar det till högnivåspråk som fungerar som den ursprungliga källkoden. Detta gör det lättare att förstå ett datorprogram när källkod inte finns tillgänglig. Det finns väldigt få verktyg för dekompilering tillgängliga idag. Den här rapporten beskriver design och implementation av Desquirr, en dekomplator-plugin för Interactive Disassembler Pro. Desquirr har en objekt-orienterad design och utför grundläggande dekompilering av program som kör på Intel x86-processorer.
Žamberský, Zdeněk. "Zpětný překladač jazyka Java." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2015. http://www.nusl.cz/ntk/nusl-232034.
Full textKollár, Jaroslav. "Optimalizace LLVM IR pro účely zpětného překladu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-264955.
Full textMacko, Lukáš. "Dekódování binárního kódu do vyšší formy reprezentace." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-264983.
Full textkalle, Sushma. "Semantic-aware Stealthy Control Logic Infection Attack." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2512.
Full textMatula, Peter. "Rekonstrukce datových typů při zpětném překladu kódu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236191.
Full textIlsoo, Jeon. "LLVM-IR based Decompilation." Wright State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1559500021466716.
Full textKřoustek, Jakub. "Analýza a převod kódů do vyššího programovacího jazyka." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2009. http://www.nusl.cz/ntk/nusl-236651.
Full textBook chapters on the topic "Decompiler"
Weik, Martin H. "decompiler." In Computer Science and Communications Dictionary, 372. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4538.
Full textNolan, Godfrey. "Decompiler Design." In Decompiling Android, 151–74. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4249-9_5.
Full textNolan, Godfrey. "Decompiler Implementation." In Decompiling Android, 175–227. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4249-9_6.
Full textNolan, Godfrey. "Decompiler Design." In Decompiling Java, 121–57. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0739-9_5.
Full textNolan, Godfrey. "Decompiler Implementation." In Decompiling Java, 159–236. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0739-9_6.
Full textĎurfina, Lukáš, Jakub Křoustek, Petr Zemek, and Břetislav Kábele. "Accurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract)." In Research in Attacks, Intrusions, and Defenses, 390–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33338-5_27.
Full textĎurfina, Lukáš, Jakub Křoustek, Petr Zemek, Dušan Kolář, Tomáš Hruška, Karel Masařík, and Alexander Meduna. "Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis." In Communications in Computer and Information Science, 72–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23141-4_8.
Full textWeik, Martin H. "decompile." In Computer Science and Communications Dictionary, 372. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4537.
Full textCifuentes, Cristina. "Structuring decompiled graphs." In Lecture Notes in Computer Science, 91–105. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-61053-7_55.
Full textNolan, Godfrey. "Protecting Your Source: Strategies for Defeating Decompilers." In Decompiling Java, 79–120. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0739-9_4.
Full textConference papers on the topic "Decompiler"
"Delphi .NET object file decompiler." In 2015 The 5th International Workshop on Computer Science and Engineering-Information Processing and Control Engineering. WCSE, 2015. http://dx.doi.org/10.18178/wcse.2015.04.033.
Full textSateanpattanakul, Siwadol. "Comments recovery approach for Java decompiler." In 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS). IEEE, 2016. http://dx.doi.org/10.1109/icis.2016.7550827.
Full textChen, Gengbiao, Zhuo Wang, Ruoyu Zhang, Kan Zhou, Shiqiu Huang, Kangqi Ni, Zhengwei Qi, Kai Chen, and Haibing Guan. "A Refined Decompiler to Generate C Code with High Readability." In 2010 17th Working Conference on Reverse Engineering (WCRE). IEEE, 2010. http://dx.doi.org/10.1109/wcre.2010.24.
Full textDurfina, Jakub Kroustek, Petr Zemek, and Bretislav Kabele. "Detection and Recovery of Functions and their Arguments in a Retargetable Decompiler." In 2012 19th Working Conference on Reverse Engineering (WCRE). IEEE, 2012. http://dx.doi.org/10.1109/wcre.2012.15.
Full textYakdan, Khaled, Sergej Dechand, Elmar Gerhards-Padilla, and Matthew Smith. "Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study." In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016. http://dx.doi.org/10.1109/sp.2016.18.
Full textKorencik, Lukas, Petr Rockai, Henrich Lauko, and Jiri Barnat. "On Symbolic Execution of Decompiled Programs." In 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2020. http://dx.doi.org/10.1109/qrs51102.2020.00044.
Full textJaffe, Alan, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, and Bogdan Vasilescu. "Meaningful variable names for decompiled code." In ICSE '18: 40th International Conference on Software Engineering. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3196321.3196330.
Full textGussoni, Andrea, Alessandro Di Federico, Pietro Fezzardi, and Giovanni Agosta. "A Comb for Decompiled C Code." In ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3320269.3384766.
Full textAlharbi, Khalid, and Tom Yeh. "Collect, Decompile, Extract, Stats, and Diff." In MobileHCI '15: 17th International Conference on Human-Computer Interaction with Mobile Devices and Services. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2785830.2785892.
Full textHamilton, James, and Sebastian Danicic. "An Evaluation of Current Java Bytecode Decompilers." In 2009 Ninth IEEE International Working Conference on Source Code Analysis and Manipulation. IEEE, 2009. http://dx.doi.org/10.1109/scam.2009.24.
Full textReports on the topic "Decompiler"
Lu, Jiquan, and Wenyong Hou. Decompile Program Graph Design and Controlling Flow Analysis. Fort Belvoir, VA: Defense Technical Information Center, May 1995. http://dx.doi.org/10.21236/ada294731.
Full text