Journal article

KŘOUSTEK Jakub. On Decompilation of VLIW Executable Files. Scientific Journal Problems in Programming. Kyiv: 2015, vol. 16, no. 1, pp. 29-37. ISSN 1727-4907. Available from: http://archive.nbuv.gov.ua/portal/natural/progr/iss/jabout.html
Publication language:english
Original title:On Decompilation of VLIW Executable Files
Title (cs):Pokroky při zpětném překladu pro VLIW architektury
Pages:29-37
Place:UA
Year:2015
URL:http://archive.nbuv.gov.ua/portal/natural/progr/iss/jabout.html
Journal:Scientific Journal Problems in Programming, Vol. 16, No. 1, Kyiv, UA
ISSN:1727-4907
Keywords
reverse engineering, decompilation, VLIW, Lissom
Annotation
Machine-code decompilation (i.e. reverse program compilation) is a process often used in reverse engineering. Its task is to transform a platform-specific executable file into a high-level language representation, which is usually the C language. In present, we can find several such tools that support different target architectures (e.g. Intel x86, MIPS, ARM). These architectures can be classified either as RISC (reduced instruction set computing) or CISC (complex instruction set computing). However, none of the existing decompilers support another major architecture type - VLIW (very long instruction word).
In this paper, we briefly describe the VLIW architecture together with its unique features and we present several novel approaches how to handle these VLIW-specific features in the decompilation process. We focus on handling of instruction lengths, instruction bundling, and data hazards.

BibTeX:
@ARTICLE{
   author = {Jakub K{\v{r}}oustek},
   title = {On Decompilation of VLIW Executable Files},
   pages = {29--37},
   journal = {Scientific Journal Problems in Programming},
   volume = {16},
   number = {1},
   year = {2015},
   ISSN = {1727-4907},
   language = {english},
   url = {http://www.fit.vutbr.cz/research/view_pub.php?id=10499}
}

Your IPv4 address: 35.153.135.60
Switch to https