Computer Science ›› 2008, Vol. 35 ›› Issue (12): 280-284.

Previous Articles     Next Articles

YANG Mu-han (State Key Laboratory of Information Security, SKLOIS, Beijing 100049, China)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Disassembly is done statically, usually. It is hard to deal with logic trap, deceiving-instruction, data-in-code, dynamic control-flow-instruction, etc. by static disassembly. On the other hand, the code can be specially designed using dynamic control-flo

Key words: Disassembly,Reverse engineering, Information security

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!