Interprocedural Data Flow Decompilation (1996)

Cached

Download Links

by Cristina Cifuentes
Venue:Journal of Programming Languages
Citations:17 - 8 self

Active Bibliography

86 Decompilation of Binary Programs – Cristina Cifuentes, K. John Gough - 1995
7 A SUIF Java compiler – Holger M. Kienle - 1998
2 A Goto-Elimination Method And Its Implementation For The McCat C Compiler – Ana Maria Erosa - 1995
LLVM-CHiMPS: Compilation Environment for FPGAs Using LLVM Compiler Infrastructure and CHiMPS Computational Model – Seung J. Lee, David K. Raila, Volodymyr V. Kindratenko
43 Taming Control Flow: A Structured Approach to Eliminating Goto Statements – Ana Erosa, Laurie J. Hendren - 1994
29 Krakatoa: Decompilation in Java (Does Bytecode Reveal Source?) – Todd A. Proebsting, Scott A. Watterson - 1997
44 General Method of Program Code Obfuscation – Gregory Wroblewski, Gregory Wroblewski - 2002
UNIVERSITY OF – unknown authors
UNIVERSITYOF – Alan Mycroft
EMIL: A Toolkit for Program Analysis and Modification – Hannu Mallat, Hannu Mallat, Dr. Tech Esko Nuutila - 1999
Analyzing Control Flow in Java Bytecode – Jianjun Zhao Department, Jianjun Zhao - 1999
A Worst Case Timing Analysis Technique for Optimized Programs – Sung-Soo Lim Dept, Sung-soo Lim - 1998
2 An Environment for the Reverse Engineering of Executable Programs – Cristina Cifuentes - 1995
1 Comparing type-based and proof-directed decompilation – Alan Mycroft, Atsushi Ohori, Shin-ya Katsumata - 2001
3 Thread warping: A framework for dynamic synthesis of thread acclerators – Greg Stitt - 2007
2 Towards a Practical Secure Framework for Mobile Code Commerce – Gael Hachez, Laurent Den Hollander, Mehrdad Jalali, Jean-Jacques Quisquater, Christophe Vasserot - 2000
FORENSIC INVESTIGATIONS – Brian D. Carrier, D. Carrier, Suzanne Iii - 2006
7 Using the SafeTSA Representation to Boost the Performance of an Existing Java Virtual Machine – Wolfram Amme, Friedrich-schiller-universit├Ąt Jena - 2003
3 Binary Synthesis – Greg Stitt, Frank Vahid