Sökning: "Dekompilering"

Visar resultat 1 - 5 av 6 uppsatser innehållade ordet Dekompilering.

  1. 1. Decompiling Go : Using metadata to improve decompilation readability

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Mattias Grenfeldt; [2023]
    Nyckelord :Decompilation; Go; Runtime Metadata; Reverse Engineering; Dekompilering; Go; Körtidsmetadata; Reverse Engineering;

    Sammanfattning : Malware written in Go is on the rise, and yet, tools for investigating Go programs, such as decompilers, are limited. A decompiler takes a compiled binary and tries to recover its source code. Go is a high-level language that requires runtime metadata to implement many of its features, such as garbage collection and polymorphism. LÄS MER

  2. 2. Decompilation of WebAssembly using Datalog

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Love Brandefelt; [2022]
    Nyckelord :Datalog; Decompiler; WebAssembly; Logic programming; Bytecode; Datalog; Dekompilator; WebAssembly; Logic programming; Bytecode;

    Sammanfattning : With 92% of today’s browsers supporting WebAssembly the need for decompilers to discover malicious code is greater than ever. The introduction of the Datalog to C++ compiler Soufflé, in 2016, enables the implementation of effective Datalog-based decompilers. LÄS MER

  3. 3. An Initial Investigation of Neural Decompilation for WebAssembly

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Adam Benali; [2022]
    Nyckelord :Decompilation; WebAssembly; Reverse Engineering; Neural Machine Translation; Décompilation; WebAssembly; Rétro-Ingénierie; Traduction Automatique Neuronale; Dekompilering; WebAssembly; Reverse Engineering; Neural Maskinöversättning;

    Sammanfattning : WebAssembly is a new standard of the World Wide Web that is used as a compilation target and which is meant to enable high-performance applications. As it becomes more popular, the need for corresponding decompilers increases, for security reasons for instance. LÄS MER

  4. 4. Is it possible to reverse engineer obfuscated bytecode back to source code?

    Kandidat-uppsats, KTH/Hälsoinformatik och logistik

    Författare :Gustav Smedberg; Jenny Malmgren; [2020]
    Nyckelord :;

    Sammanfattning : AbstractThere are a lot of old software in the world that has not been supported or kept up todate and would need to be updated to seal security vulnerabilities, as well as to updatefunctions in the program. In those cases where the source code has been lost ordeliberately deleted, would it be possible to use reverse engineering to retrieve thesource code?This study aims to show what java bytecode is and how it is used, as well as how oneis able to go from java bytecode back to source code in a process called Reverse Engineering. LÄS MER

  5. 5. Penetration testing a civilian drone : Reverse engineering software in search for security vulnerabilities

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Viktor Edström; Eldar Zeynalli; [2020]
    Nyckelord :;

    Sammanfattning : Civilian drones have become more popular in recent years. As an IoT (Internet of Things) device full of state of the art technologies, its level of security is highly relevant. That is why we chose to take a look at the previous research done in the field to see how the attack surface of civilian drones looks. LÄS MER