IDA Pro Decompiler Basics Microcode and x86 Calling Conventions
Автор: OALabs
Загружено: 2021-01-26
Просмотров: 13467
** I MADE A MISTAKE **
Check out Rolf's excellent explanation of how I got the microcode optimization part wrong:
https://reverseengineering.stackexcha...
-----
OALABS DISCORD
/ discord
OALABS PATREON
/ oalabs
OALABS TIP JAR
https://ko-fi.com/oalabs
OALABS GITHUB
https://github.com/OALabs
UNPACME - AUTOMATED MALWARE UNPACKING
https://www.unpac.me/#/
-----
Join us for a look under the hood at how IDA Pro optimizes their microcode (IL) to provide a clean decompiled view. We also reverse engineer a bug in calling convention identification for x86 can lead to cascading issues in the intermediate representation as it is optimized.
Automated Malware Unpacking
https://www.unpac.me/
Introduction to IDA's microcode
• Decompiler Internals: Microcode
__fastcall
https://docs.microsoft.com/en-us/cpp/...
__thiscall
https://docs.microsoft.com/en-us/cpp/...
How to force a call type
https://www.hex-rays.com/products/dec...
Lucid IDA Plugin View Microcode
https://github.com/gaasedelen/lucid
Feedback, questions, and suggestions are always welcome : )
Sergei / herrcore
Sean / seanmw
As always check out our tools, tutorials, and more content over at https://www.openanalysis.net
#ReverseEngineering #IDAPro #IntermediateRepresentation
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: