Zeitschriftenartikel
Analyzing Malware Putty using Function Alignment in the Binary
Lade...
Volltext URI
Dokumententyp
Text/Journal Article
Zusatzinformation
Datum
2016
Autor:innen
Zeitschriftentitel
ISSN der Zeitschrift
Bandtitel
Verlag
Geselllschaft für Informatik e.V.
Zusammenfassung
This paper shows a representation of executables and an alignment of functions in an executable to be used when reverse engineering embedded systems. These techniques are not limited to this application and can also be used when studying code variations, code clone-and-own scenarios, and when locating hotspots for software quality inspections.