Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Jakub Křoustek"'
Autor:
Dušan Kolář, Jakub Křoustek
Publikováno v:
Acta Informatica Pragensia, Vol 2, Iss 1, Pp 18-29 (2013)
Program comprehension and reverse engineering are two large domains of computer science that have one common goal – analysis of existing programs and understanding their behaviour. In present, methods of source code analysis are well established an
Externí odkaz:
https://doaj.org/article/c69bcda1494d4f59b7c87fd48077d029
Publikováno v:
Computer Science and Information Systems. 11:1337-1359
Retargetable executable-code decompilation is a one of the most complicated reverse-engineering tasks. Among others, it involves de-optimization of compiler-optimized code. One type of such an optimization is usage of so-called instruction idioms. Th
Autor:
Jakub Křoustek, Dušan Kolář
Publikováno v:
Acta Informatica Pragensia, Vol 2, Iss 1, Pp 18-29 (2013)
Program comprehension and reverse engineering are two large domains of computer science that have one common goal – analysis of existing programs and understanding their behaviour. In present, methods of source code analysis are well established an
Autor:
Jakub Křoustek, Dušan Kolář
Publikováno v:
Computer Science and Information Systems. 10:1673-1701
The very first step of each tool such as linker, disassembler, or debugger is parsing of an input executable or object file. These files are stored in one of the existing object file formats (OFF). Retargetable tools are not limited to any particular
Autor:
Dušan Kolář, Jakub Křoustek
Publikováno v:
AIP Conference Proceedings.
Parsing and processing of binary object files is a preliminary task of several tools, such as linkers, disassemblers, and debuggers. Retargetable tools, i.e. tools that are not limited to a particular platform, have to deal with handling of several o
Publikováno v:
Research in Attacks, Intrusions, and Defenses ISBN: 9783642333378
RAID
RAID
Introduction. Decompilation is used for translation of executable files into a high-level language (HLL) representation. It is an important mechanism for information forensics and malware analysis. Retargetable decompilation represents a very difficu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1ddf7b031f64521d40d3ac8308dbd46e
https://doi.org/10.1007/978-3-642-33338-5_27
https://doi.org/10.1007/978-3-642-33338-5_27
Publikováno v:
GSTF INTERNATIONAL JOURNAL ON COMPUTING. 1
Most of modern embedded systems for multimedia and network applications are based on parallel data stream processing. The data processing can be done using very long instruction word processors (VLIW), or using more than one high performance applicat
Autor:
Petr Zemek, Dušan Kolář, Alexander Meduna, Jakub Křoustek, Lukáš Ďurfina, Karel Masařík, Tomáš Hruška
Publikováno v:
Communications in Computer and Information Science ISBN: 9783642231407
ISA
ISA
Together with the massive expansion of smartphones, tablets, and other smart devices, we can notice a growing number of malware threats targeting these platforms. Software security companies are not prepared for such diversity of target platforms and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e6c134ee26293bdaa13ca6dafcf8334d
https://doi.org/10.1007/978-3-642-23141-4_8
https://doi.org/10.1007/978-3-642-23141-4_8