Wichmann, ArneSchulze, SandroSchupp, Sibylle2023-03-082023-03-082016https://dl.gi.de/handle/20.500.12116/40727This paper shows a representation of executables and an alignment of functions in an executable to be used when reverse engineering embedded systems. These techniques are not limited to this application and can also be used when studying code variations, code clone-and-own scenarios, and when locating hotspots for software quality inspections.enAnalyzing Malware Putty using Function Alignment in the BinaryText/Journal Article0720-8928