Result Details

Retargetable Decompiler

Created: 2013
Type
software
Language
English
Authors
Ďurfina Lukáš, Ing., Ph.D., DIFS (FIT)
Křoustek Jakub, Ing., Ph.D., DIFS (FIT)
Zemek Petr, Ing., Ph.D., DIFS (FIT)
Vrana Ondřej, Ing., DIFS (FIT)
Matula Peter, Ing., DIFS (FIT)
Kolář Dušan, doc. Dr. Ing., DIFS (FIT)
Description

The retargetable machine-code decompiler is used for translating binary executable files back into a high-level language representation (e.g. C source code). It can be used for source code reconstruction, binary code migration, malware analysis, etc. Retargetable decompilation is independent on a target architecture (e.g. MIPS, ARM, x86), operating system (e.g. Windows, Linux), and object file format (e.g. WinPE, ELF). The supported output formats are C and Python-like source codes, assembler, call graphs, and control-flow graphs. The decompiler is implemented as a toolchain containing several applications.

Keywords

reverse engineering, decompilation, decompiler, retargetability, executable file, Lissom

URL
License
In order to use the result by another entity, it is always necessary to acquire a license
License Fee
The licensor does not require a license fee for the result in some cases
Projects
System for Support of Platform Independent Malware Analysis in Executable Files, TAČR, Program aplikovaného výzkumu a experimentálního vývoje ALFA, TA01010667, start: 2011-01-01, end: 2013-12-31, completed
Research groups
Departments
Back to top