Publication Details
Approaching Retargetable Static, Dynamic, and Hybrid Executable-Code Analysis
debugger, decompiler, static and dynamic analysis, reverse engineering, Lissom
Program comprehension and reverse engineering are two large domains of computer science that have one common goal - analysis of existing programs and understanding their behavior. In present, methods of source-code analysis are well established and used in practice by software engineers. On the other hand, analysis of executable code is a more challenging task that is not fully covered by existing tools. Furthermore, methods of retargetable executable-code analysis are rare because of their complexity. In this paper, we present a complex platform-independent toolchain for executable-code analysis that supports both static and dynamic analysis. This toolchain exploits several previously designed methods and it can be used for debugging user's applications as well as malware analysis, etc. We illustrate its usage on several real-world scenarios. The toolchain is developed within the Lissom project.
@ARTICLE{FITPUB10258, author = "Jakub K\v{r}oustek and Du\v{s}an Kol\'{a}\v{r}", title = "Approaching Retargetable Static, Dynamic, and Hybrid Executable-Code Analysis", pages = "18--29", journal = "Acta Informatica Pragensia", volume = 2, number = 1, year = 2013, ISSN = "1805-4951", language = "english", url = "https://www.fit.vut.cz/research/publication/10258" }