@inproceedings{9859662fc13b4913a839056174f88a90,
title = "Disassembly of executable code revisited",
abstract = "Machine code disassembly routines form a fundamental component of software systems that statically analyze or modify executable programs, e.g., reverse engineering systems, static binary translators, and link-time optimizers. The task of disassembly is complicated by indirect jumps and the presence of non-executable data - jump tables, alignment bytes, etc. - in the instruction stream. Existing disassembly algorithms are not always able to cope successfully with executable files containing such features, and they fail silently - i.e., produce incorrect disassemblies without any indication that the results they are producing are incorrect. In this paper we examine two commonly-used disassembly algorithms and illustrate their shortcomings. We propose a hybrid approach that performs better than these algorithms in the sense that it is able to detect situations where the disassembly may be incorrect and limit the extent of such disassembly errors. Experimental results indicate that the algorithm is quite effective: the amount of code flagged as incurring disassembly errors is usually quite small.",
keywords = "Assembly, Computer science, Information analysis, Joining processes, Libraries, Reverse engineering, Software systems",
author = "Benjamin Schwarz and Saumya Debray and Gregory Andrews",
note = "Publisher Copyright: {\textcopyright} 2002 IEEE.; 9th Working Conference on Reverse Engineering, WCRE 2002 ; Conference date: 29-10-2002 Through 01-11-2002",
year = "2002",
doi = "10.1109/WCRE.2002.1173063",
language = "English (US)",
series = "Proceedings - Working Conference on Reverse Engineering, WCRE",
publisher = "IEEE Computer Society",
pages = "45--54",
editor = "Elizabeth Burd and {van Deursen}, Arie",
booktitle = "Proceedings - 9th Working Conference on Reverse Engineering, WCRE 2002",
}