dc.contributor.author | Pettersen, Håvard | |
dc.contributor.author | Morrison, Donn Alexander | |
dc.date.accessioned | 2024-03-01T10:27:57Z | |
dc.date.available | 2024-03-01T10:27:57Z | |
dc.date.created | 2024-01-12T11:04:56Z | |
dc.date.issued | 2023 | |
dc.identifier.issn | 1892-0713 | |
dc.identifier.uri | https://hdl.handle.net/11250/3120623 | |
dc.description.abstract | This study addresses the challenge of reverse engineering binaries from unknown instruction set architectures, a complex task with potential implications for software maintenance and cyber-security. We focus on the tasks of detecting candidate call and return opcodes for automatic extraction of call graphs in order to simplify the reverse engineering process. Empirical testing on a small dataset of binary files from different architectures demonstrates that the approach can accurately detect specific opcodes under conditions of noisy data. The method lays the groundwork for a valuable tool for reverse engineering where the reverse engineer has minimal a priori knowledge of the underlying instruction set architecture. | |
dc.description.abstract | Call graph discovery in binary programs from unknown instruction set architectures | |
dc.language.iso | eng | |
dc.title | Call graph discovery in binary programs from unknown instruction set architectures | |
dc.title.alternative | Call graph discovery in binary programs from unknown instruction set architectures | |
dc.type | Peer reviewed | |
dc.type | Journal article | |
dc.description.version | acceptedVersion | |
dc.source.journal | NIKT: Norsk IKT-konferanse for forskning og utdanning | |
dc.identifier.cristin | 2225199 | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |