A Novel Lightweight Virtual Machine Based Decompiler to Generate C/C++ Code with High Readability

نویسندگان

  • Gengbiao Chen
  • Zhuo Wang
  • Ruoyu Zhang
  • Kan Zhou
  • Shiqiu Huang
  • Kangqi Ni
  • Zhengwei Qi
چکیده

As a key part of reverse engineering, decompilation plays a very important role in software security and maintenance. Many decompilation techniques and tools have been developed while all of them have defects in different aspects. For example, IDA Hex rays generates pseudocodes with poor readability, and Boomerang is unable to identify composite structures such as Classes and multidimensional arrays. In this paper we present C-Decompiler, an integrated C/C++ decompiler based on lightweight virtual machine, which is capable to analyze the data flow especially the data dependency across basic blocks with high accuracy. C-Decompiler is able to recognize composite structures and libraries, such as Standard Template Library. Our experimental results show that on average C-Decompiler has the highest reduction rate of 55.91% and lowest expansion rate of 55.79%, which prove that the code decompiled by C-Decompiler is most similar to the original code in comparison with other existing decompilers such as Boomerang and IDA Hex rays. Furthermore, C-Decompiler is able to recognize all the functions without any false positive nor false negative, and it is convincing to support that the code decompiled by CDecompiler is of high readability by the least redundancy and most accuracy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Decompilation of Binary Programs

The structure of a decompiler is presented, along with a thorough description of the different modules that form part of a decompiler, and the type of analyses that are performed on the machine code to regenerate high-level language code. The phases of the decompiler have been grouped into three main modules: front-end, universal decompiling machine, and back-end. The front-end is a machine-dep...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

A Lightweight Approach Multiplexing Resource Allocation Scheme by Virtualization based on Time Series in SOC

By leveraging virtual machine (VM) technology which provides performance and fault isolation, Cloud resources can be provisioned on demand in a fine-grained, multiplexed manner rather than in monolithic pieces. By integrating volunteer computing into Cloud architectures, we envision a gigantic Self-Organizing Cloud (SOC) being formed to reap the huge potential of untapped commodity computing po...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Android: From Reversing to Decompilation

This talk deals with Android’s bytecode analysis. The Android system is now widespread, and lots of applications are developed each days. These applications are mostly written in Java, though it is possible to do calls to binaries or shared libraries. To be executed on the DVM the Java source code is translated into Java bytecode (.class files) and then a tool named ‘dx’ is used to convert it i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010