| Bài phỏng vấn Rolf Rolles của HITB hay đến từng cm :D , đây mới đúng là hacker: | |
| http://magazine.hitb.org/issues/HITB-Ezine-Issue-005.pdf | |
| What are your favorite reverse engineering tools? | |
| IDA, Resource Hacker, 010 Editor, VMWare, SoftICE, and those that I develop myself. | |
| How would you describe the process of reverse engineering to a beginner? | |
| Step 0: Pose a question (how is the program accomplishing X?). | |
| Step 1: Find a portion of the code relevant to the inquiry via a variety of static and dynamic means. | |
| Step 2: Analyze that code to obtain information; annotate the binary with what you have learned. |
(draft; work in progress)
See also:
- Compilers
- Program analysis:
- Dynamic analysis - instrumentation, translation, sanitizers
On September 28, 2021, I asked on Twitter:
PL Twitter:
you get to recommend one published PL paper for an undergrad to read with oversight by someone experienced. the paper should be interesting, approachable, and (mostly) self-contained.
what paper do you recommend?
Here's a much more complete description of how I do SSA, beyond just how I do Phis.
This describes how I do SSA form, which avoids the need to have any coupling between CFG data structures and SSA data structures.
Let's first define a syntax for SSA and some terminology. Here's an example SSA node:
A = Add(B, C)
In reality, this will be a single object in your in-memory representation, and the names are really addresses of those objects. So, this node has an "implicit variable" called A; it's the variable that is implicitly assigned to when you execute the node. If you then do: