National Repository of Grey Literature 33 records found  beginprevious31 - 33  jump to record: Search took 0.00 seconds. 
Translation of x86 Binary Code To a High-Level Language
Jurík, Marián ; Křivka, Zbyněk (referee) ; Kolář, Dušan (advisor)
The purpose of this MSc thesis is to create design and implementation of program for translation of x86 binary code to a high-level programming language. There is described PE file format for executables used in MS Windows operating systems in the first part of work. This document contains general information about instruction set IA-32, especially a way of decoding binary code to assembly language. There are described typical program constructions, which are being used in compilers. Design of creation high-level programming language was inspired by existing programming languages. Conclusion is made about advantages and disadvantages of approach used in this thesis.
Java Bytecode Disassembler
Hřibal, Jaromír ; Kučera, Jiří (referee) ; Křivka, Zbyněk (advisor)
The first part of this thesis studies the fundamental principles of Java Virtual Machine and presents in depth look at its instruction set and . class file format, both together well known as bytecode . The next part presents an overview of the existing tools for bytecode manipulation . The last part of this work describes the development of a new plugin for Eclipse IDE . This plugin allows the user to get more comfortable view of the given bytecode and to see the original source code from which the bytecode was generated . The plugin requires the source code to be accessible so it is not a typical decompilation tool .
Malware analysis and reverse engineering
Šváb, Martin ; Čermák, Igor (advisor) ; Hlaváč, Jindřich (referee)
Focus of this thesis is reverse engineering in information technology closely linked with the malware analysis. It explains fundamentals of IA-32 processors architecture and basics of operating system Microsoft Windows. Main part of this thesis is dedicated to the malware analysis, including description of creating a tool for simplification of static part of the analysis. In Conclusion various approaches to the malware analysis, which were described in previous part of the thesis, are practically demonstrated on unknown malware sample.

National Repository of Grey Literature : 33 records found   beginprevious31 - 33  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.