[图书][B] Modern compiler design

D Grune, K Van Reeuwijk, HE Bal, CJH Jacobs… - 2012 - books.google.com
" Modern Compiler Design" makes the topic of compiler design more accessible by focusing
on principles and techniques of wide application. By carefully distinguishing between the …

Off-device anti-malware protection for mobile devices

AJ Bettini, K Watkins, DJ Guerra, M Price - US Patent 8,918,881, 2014 - Google Patents
Techniques for off-device anti-malware protection for mobile devices are disclosed. In some
embodiments, off-device anti malware protection for mobile devices includes receiving a …

[图书][B] Reverse compilation techniques

C Cifuentes - 1994 - rgaucher.info
Techniques for writing reverse compilers or decompilers are presented in this thesis. These
techniques are based on compiler and optimization theory, and are applied to decompilation …

Decompilation of binary programs

C Cifuentes, KJ Gough - Software: Practice and Experience, 1995 - Wiley Online Library
The structure of a decompiler is presented, along with a thorough description of the different
modules that form part of a decompiler, and the type of analyses that are performed on the …

In-line filtering of insecure or unwanted mobile device software components or communications

AJ Bettini, K Watkins, DJ Guerra, M Price - US Patent 8,819,772, 2014 - Google Patents
Techniques for in-line filtering of insecure or unwanted mobile components or
communications (eg, insecure or unwanted behaviors associated with applications for …

Quantifying the risks of applications for mobile devices

AJ Bettini, K Watkins, DJ Guerra, M Price - US Patent 8,713,684, 2014 - Google Patents
An application, also referred to as an “app.” generally refers to a software application that
executes on a computing device, such as a mobile device. For example, mobile devices …

Warp processors

R Lysecky, G Stitt, F Vahid - ACM Transactions on Design Automation of …, 2004 - dl.acm.org
We describe a new processing architecture, known as a warp processor, that utilizes a field-
programmable gate array (FPGA) to improve the speed and energy consumption of a …

[PDF][PDF] No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.

K Yakdan, S Eschweiler, E Gerhards-Padilla, M Smith - NDSS, 2015 - Citeseer
Decompilation is important for many security applications; it facilitates the tedious task of
manual malware reverse engineering and enables the use of source-based security tools on …

Intraprocedural static slicing of binary executables

C Cifuentes, A Fraboulet - 1997 Proceedings International …, 1997 - ieeexplore.ieee.org
Program slicing is a technique for determining the set of statements of a program that
potentially affect the value of a variable at some point in the program. Intra and …

Assembly to high-level language translation

C Cifuentes, D Simon… - … Conference on Software …, 1998 - ieeexplore.ieee.org
Translation of assembly code to high-level language code is of importance in the
maintenance of legacy code, as well as in the areas of program understanding, porting, and …