吾爱破解 - 52pojie.cn

 找回密码
 注册[Register]

QQ登录

只需一步,快速开始

查看: 3949|回复: 0
收起左侧

[Disassemblers] Jakstab decompiler

[复制链接]
风吹屁屁凉 发表于 2013-2-3 01:09
Jakstab is an Abstract Interpretation-based, integrated disassembly and static analysis framework for designing analyses on executables and recovering reliable control flow graphs. It is designed to be adaptable to multiple hardware platforms using customized instruction decoding and processor specifications similar to the Boomerang decompiler. It is written in Java, and in its current state supports x86 processors and 32-bit Windows PE or Linux ELF executables.

Jakstab translates machine code to a low level intermediate language on the fly as it performs data flow analysis on the growing control flow graph. Data flow information is used to resolve branch targets and discover new code locations. Other analyses can either be implemented in Jakstab to run together with the main control flow reconstruction to improve precision of the disassembly, or they can work on the resulting preprocessed control flow graph. Analyses are implemented using the Configurable Program Analysis (CPA) approach.

The whole system was developed as part of Johannes Kinder's dissertation work on static analysis of x86 executables at TU München and TU Darmstadt. As of March 2011, he has moved to EPFL, but is still maintaining and extending Jakstab as part of ongoing research projects.


Jakstab-0.8.3

http://www.jakstab.org/download/Jakstab-0.8.3.zip?attredirects=0&d=1


Jakstab-0.8.3-noinput

http://www.jakstab.org/download/Jakstab-0.8.3-noinput.zip?attredirects=0&d=1


Source:

https://bitbucket.org/jkinder/jakstab/

发帖前要善用论坛搜索功能,那里可能会有你要找的答案或者已经有人发布过相同内容了,请勿重复发帖。

您需要登录后才可以回帖 登录 | 注册[Register]

本版积分规则

返回列表

RSS订阅|小黑屋|处罚记录|联系我们|吾爱破解 - LCG - LSG ( 京ICP备16042023号 | 京公网安备 11010502030087号 )

GMT+8, 2024-11-15 20:34

Powered by Discuz!

Copyright © 2001-2020, Tencent Cloud.

快速回复 返回顶部 返回列表