Publication Details
Decompilation of VLIW Executable Files - Caveats and Pitfalls
reverse engineering, decompilation, retargetable decompiler, VLIW, Lissom
The task of machine-code decompilation is to reconstruct a high-level-language (HLL) representation, such as C code, from a binary executable file. In present, we can find several such tools that support different target architectures (e.g. Intel x86, ARM, PowerPC). Each of these architectures can be classified either as RISC (reduced instruction set computing) or CISC (complex instruction set computing). However, none of the existing decompilers support another major architecture type - VLIW (very long instruction word). In recent years, VLIW processors are once again on the rise because of their high performance. Therefore, there is a demand of a VLIW-supporting decompiler.
In this paper, we depict the unique features of the VLIW architecture and we present several approaches how to handle them in the decompilation process.
@INPROCEEDINGS{FITPUB10459, author = "Jakub K\v{r}oustek", title = "Decompilation of VLIW Executable Files - Caveats and Pitfalls", pages = "287--296", booktitle = "3nd International Scientific Conference Theoretical and Applied Aspects of Cybernetics", year = 2013, location = "Kyiv, UA", publisher = "Cybernetics Faculty of Taras Shevchenko National University of Kyiv", ISBN = "978-966-399-538-0", language = "english", url = "https://www.fit.vut.cz/research/publication/10459" }