The Technique of Binary Code Decompilation and Its Application in Information Security Sphere
The authors describes a new technique of binary code decompilation and its application possibility in information security such as software protection against reverse engineering and code obfuscation analyze in malware.
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2012-12-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/435 |
_version_ | 1797719213105741824 |
---|---|
author | M. O. Shudrak I. A. Lubkin V. V. Zolotarev |
author_facet | M. O. Shudrak I. A. Lubkin V. V. Zolotarev |
author_sort | M. O. Shudrak |
collection | DOAJ |
description | The authors describes a new technique of binary code decompilation and its application possibility in information security such as software protection against reverse engineering and code obfuscation analyze in malware. |
first_indexed | 2024-03-12T09:01:32Z |
format | Article |
id | doaj.art-331008f15c054fce99118140b2c99886 |
institution | Directory Open Access Journal |
issn | 2074-7128 2074-7136 |
language | English |
last_indexed | 2024-03-12T09:01:32Z |
publishDate | 2012-12-01 |
publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
record_format | Article |
series | Безопасность информационных технологий |
spelling | doaj.art-331008f15c054fce99118140b2c998862023-09-02T15:37:03ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362012-12-011937580425The Technique of Binary Code Decompilation and Its Application in Information Security SphereM. O. ShudrakI. A. LubkinV. V. ZolotarevThe authors describes a new technique of binary code decompilation and its application possibility in information security such as software protection against reverse engineering and code obfuscation analyze in malware.https://bit.mephi.ru/index.php/bit/article/view/435decompilationcode analyzesoftware securitycode obfuscation |
spellingShingle | M. O. Shudrak I. A. Lubkin V. V. Zolotarev The Technique of Binary Code Decompilation and Its Application in Information Security Sphere Безопасность информационных технологий decompilation code analyze software security code obfuscation |
title | The Technique of Binary Code Decompilation and Its Application in Information Security Sphere |
title_full | The Technique of Binary Code Decompilation and Its Application in Information Security Sphere |
title_fullStr | The Technique of Binary Code Decompilation and Its Application in Information Security Sphere |
title_full_unstemmed | The Technique of Binary Code Decompilation and Its Application in Information Security Sphere |
title_short | The Technique of Binary Code Decompilation and Its Application in Information Security Sphere |
title_sort | technique of binary code decompilation and its application in information security sphere |
topic | decompilation code analyze software security code obfuscation |
url | https://bit.mephi.ru/index.php/bit/article/view/435 |
work_keys_str_mv | AT moshudrak thetechniqueofbinarycodedecompilationanditsapplicationininformationsecuritysphere AT ialubkin thetechniqueofbinarycodedecompilationanditsapplicationininformationsecuritysphere AT vvzolotarev thetechniqueofbinarycodedecompilationanditsapplicationininformationsecuritysphere AT moshudrak techniqueofbinarycodedecompilationanditsapplicationininformationsecuritysphere AT ialubkin techniqueofbinarycodedecompilationanditsapplicationininformationsecuritysphere AT vvzolotarev techniqueofbinarycodedecompilationanditsapplicationininformationsecuritysphere |