Blog
 

Vulnerability detection in theory and practice, or why there is no ideal static analyzer

28.08.2018
Vulnerability detection in theory and practice, or why there is no ideal static analyzer
Today, high-quality software development can hardly be imagined without static code analysis methods.

Legacy code analysis without a source code: to do or not to do?

02.07.2018
Legacy code analysis without a source code: to do or not to do?

Analyzing a binary code — the code executed by a machine — is a tricky task. In most cases, before such analysis, binary code needs to be disassembled and then decompiled into a high-level representation.

Writing real Pointer Analysis algorithm for LLVM. Part 1: Introduction or a first date with program analysis universe

30.08.2017
Writing real Pointer Analysis algorithm for LLVM. Part 1: Introduction or a first date with program analysis universe

This post introduces a short series on my pointer analysis posts. Pointer analysis algorithms are used to identify, with a given accuracy, those memory areas which variables or expressions may point to. Without information about pointers, it is almost impossible to analyze pointer-intensive programs (i.e. those written in any modern language, such as C, C++, C#, Java, Python, etc.).

The Art of Decompilation: Yesterday, Today, and Tomorrow

07.08.2017
The Art of Decompilation: Yesterday, Today, and Tomorrow

Some time ago, we looked at turning black to white and how decompilation would be used in industrial systems, with our analysis involving discussion of two practical aspects: legacy system algorithm reconstruction and backdoor detection.


News 25 - 28 of 33
First | Prev. | 5 6 7 8 9 | Next | Last
Buy a Solar appScreener
.