Vis enkel innførsel

dc.contributor.authorPettersen, Håvard
dc.contributor.authorMorrison, Donn Alexander
dc.date.accessioned2024-03-01T10:27:57Z
dc.date.available2024-03-01T10:27:57Z
dc.date.created2024-01-12T11:04:56Z
dc.date.issued2023
dc.identifier.issn1892-0713
dc.identifier.urihttps://hdl.handle.net/11250/3120623
dc.description.abstractThis study addresses the challenge of reverse engineering binaries from unknown instruction set architectures, a complex task with potential implications for software maintenance and cyber-security. We focus on the tasks of detecting candidate call and return opcodes for automatic extraction of call graphs in order to simplify the reverse engineering process. Empirical testing on a small dataset of binary files from different architectures demonstrates that the approach can accurately detect specific opcodes under conditions of noisy data. The method lays the groundwork for a valuable tool for reverse engineering where the reverse engineer has minimal a priori knowledge of the underlying instruction set architecture.
dc.description.abstractCall graph discovery in binary programs from unknown instruction set architectures
dc.language.isoeng
dc.titleCall graph discovery in binary programs from unknown instruction set architectures
dc.title.alternativeCall graph discovery in binary programs from unknown instruction set architectures
dc.typePeer reviewed
dc.typeJournal article
dc.description.versionacceptedVersion
dc.source.journalNIKT: Norsk IKT-konferanse for forskning og utdanning
dc.identifier.cristin2225199
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel