2013 20th Working Conference on Reverse Engineering (WCRE) (2002)
Oct. 29, 2002 to Nov. 1, 2002
Machine code disassembly routines form a fundamental component of software systems that statically analyze or modify executable programs, e.g., reverse engineering systems, static binary translators, and link-time optimizers. The task of disassembly is complicated by indirect jumps and the presence of non-executable data--jump tables, alignment bytes, etc.--in the instruction stream. Existing disassembly algorithms are not always able to cope successfully with executable files containing such features, and they fail silently--i.e., produce incorrect disassemblies without any indication that the results they are producing are incorrect. In this paper we examine two commonly-used disassembly algorithms and illustrate their shortcomings. We propose a hybrid approach that performs better than these algorithms in the sense that it is able to detect situations where the disassembly may be incorrect and limit the extent of such disassembly errors. Experimental results indicate that the algorithm is quite effective: the amount of code flagged as incurring disassembly errors is usually quite small.
S. Debray, G. Andrews, B. Schwarz, "Disassembly of Executable Code Revisited", 2013 20th Working Conference on Reverse Engineering (WCRE), vol. 00, no. , pp. 0045, 2002, doi:10.1109/WCRE.2002.1173063