top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Essential spectrum-based fault localization / / Xiaoyuan Xie, Baowen Xu
Essential spectrum-based fault localization / / Xiaoyuan Xie, Baowen Xu
Autore Xie Xiaoyuan
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (XII, 172 p. 17 illus.)
Disciplina 005.14
Soggetto topico Debugging in computer science
Computer software - Testing
Software engineering
ISBN 981-336-179-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Introduction -- Chapter 2. A Theoretical Framework for Spectrum-based Fault Localization -- Chapter 3. Theoretical Comparison Among Risk Evaluation Formulas -- Chapter 4. On the Maximality of Spectrum-based Fault Localization -- Chapter 5. A Generalized Theoretical Framework for Hybrid Spectrum-based Fault Localization -- Chapter 6. Practicality of the Theoretical Frameworks -- Chapter 7. Tackling the Oracle Problem in Spectrum-based Fault Localization -- Chapter 8. Spectrum-based Fault Localization for Multiple Faults -- Chapter 9. Conclusion.
Record Nr. UNISA-996464486203316
Xie Xiaoyuan  
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Foundations of ARM64 Linux Debugging, Disassembling, and Reversing : Analyze Code, Understand Stack Memory Usage, and Reconstruct Original C/C++ Code with ARM64 / / Dmitry Vostokov
Foundations of ARM64 Linux Debugging, Disassembling, and Reversing : Analyze Code, Understand Stack Memory Usage, and Reconstruct Original C/C++ Code with ARM64 / / Dmitry Vostokov
Autore Vostokov Dmitry
Edizione [1st ed. 2023.]
Pubbl/distr/stampa New York, NY : , : Apress Media LLC, , [2023]
Descrizione fisica 1 online resource (180 pages)
Disciplina 005.432
Soggetto topico Operating systems (Computers)
Open source software
Debugging in computer science
ISBN 1-4842-9082-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1 - A64.1: Memory, Registers, and Simple Arithmetic -- Chapter 2 - A64.2: Code Optimization -- Chapter 3 - A64.3: Number Representations -- Chapter 4 - A64.4: Pointers -- Chapter 5 - A64.5: Bytes, Half Words, Words, and Double Words -- Chapter 6 - A64.6: Pointers to Memory -- Chapter 7 - A64.7: Logical Instructions and PC -- Chapter 8 - A64.8: Reconstructing a Program with Pointers -- Chapter 9 - A64.9: Memory and Stacks -- Chapter 10 - A64.10: Frame Pointer and Local Variables -- Chapter 11- A64.11: Function Parameters -- Chapter 12 - A64.12: More Instructions -- Chapter 13 - A64.13: Function Pointer Parameters -- Chapter 14 - A64.14: Summary of Code Disassembly Patterns.
Record Nr. UNINA-9910647395003321
Vostokov Dmitry  
New York, NY : , : Apress Media LLC, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Foundations of Linux Debugging, Disassembling, and Reversing : Analyze Binary Code, Understand Stack Memory Usage, and Reconstruct C/C++ Code with Intel X64 / / Dmitry Vostokov
Foundations of Linux Debugging, Disassembling, and Reversing : Analyze Binary Code, Understand Stack Memory Usage, and Reconstruct C/C++ Code with Intel X64 / / Dmitry Vostokov
Autore Vostokov Dmitry
Edizione [1st ed. 2023.]
Pubbl/distr/stampa New York, NY : , : Apress Media LLC, , [2023]
Descrizione fisica 1 online resource (181 pages)
Disciplina 005.432
Soggetto topico Operating systems (Computers)
Open source software
Debugging in computer science
ISBN 1-4842-9153-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter One - x64.1: Memory, Registers, and Simple Arithmetic -- Chapter Two - x64.2: Code Optimization -- Chapter Three - x64.3: Number Representations -- Chapter Four - x64.4: Pointers -- Chapter Five - x64.5: Bytes, Words, Double, and Quad Words -- Chapter Six - x64.6: Pointers to Memory -- Chapter Seven - x64.7: Logical Instructions and RIP -- Chapter Eight - x64.8: Reconstructing a Program with Pointers -- Chapter Nine - x64.9: Memory and Stacks -- Chapter Ten - x64.10: Frame Pointer and Local Variables -- Chapter Eleven - x64.11: Function Parameters -- Chapter Twelve - x64.12: More Instructions -- Chapter Thirteen - x64.13: Function Pointer Parameters -- Chapter Fourteen - x64.14: Summary of Code Disassembly Patterns.
Record Nr. UNINA-9910647386003321
Vostokov Dmitry  
New York, NY : , : Apress Media LLC, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Fundamentals of Trace and Log Analysis : A Pattern-Oriented Approach to Monitoring, Diagnostics, and Debugging / / by Dmitry Vostokov
Fundamentals of Trace and Log Analysis : A Pattern-Oriented Approach to Monitoring, Diagnostics, and Debugging / / by Dmitry Vostokov
Autore Vostokov Dmitry
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2023
Descrizione fisica 1 online resource (151 pages)
Disciplina 005.1
Soggetto topico Execution traces (Computer program testing)
Debugging in computer science
ISBN 1-4842-9896-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Fundamentals -- Chapter 2: Vocabulary Patterns -- Chapter 3: Error Patterns -- Chapter 4: Trace as a Whole -- Chapter 5: Large-Scale Patterns -- Chapter 6: Activity Patterns -- Chapter 7: Message Patterns -- Chapter 8: Block Patterns -- Chapter 9: Trace Set Patterns -- Extra New Chapter 10: Data Patterns.
Record Nr. UNINA-9910760253003321
Vostokov Dmitry  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of software fault localization : foundations and advances / / edited by W. Eric Wong, T. H. Tse
Handbook of software fault localization : foundations and advances / / edited by W. Eric Wong, T. H. Tse
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2023]
Descrizione fisica 1 online resource (611 pages)
Disciplina 005.1
Soggetto topico Software failures
Software failures - Data processing
Debugging in computer science
Computer software - Quality control
ISBN 1-119-88092-0
1-119-29181-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright Page -- Contents -- Editor Biographies -- List of Contributors -- Chapter 1 Software Fault Localization: an Overview of Research, Techniques, and Tools -- 1.1 Introduction -- 1.2 Traditional Fault Localization Techniques -- 1.2.1 Program Logging -- 1.2.2 Assertions -- 1.2.3 Breakpoints -- 1.2.4 Profiling -- 1.3 Advanced Fault Localization Techniques -- 1.3.1 Slicing-Based Techniques -- 1.3.2 Program Spectrum-Based Techniques -- 1.3.2.1 Notation -- 1.4 Subject Programs -- 1.5 Evaluation Metrics -- 1.6 Software Fault Localization Tools -- 1.7 Critical Aspects -- 1.7.1 Fault Localization with Multiple Bugs -- 1.7.2 Inputs, Outputs, and Impact of Test Cases -- 1.7.3 Coincidental Correctness -- 1.7.4 Faults Introduced by Missing Code -- 1.7.5 Combination of Multiple Fault Localization Techniques -- 1.7.6 Ties Within Fault Localization Rankings -- 1.7.7 Fault Localization for Concurrency Bugs -- 1.7.8 Spreadsheet Fault Localization -- 1.7.9 Theoretical Studies -- 1.8 Conclusion -- 1.8 Notes -- References -- Chapter 2 Traditional Techniques for Software Fault Localization -- 2.1 Program Logging -- 2.2 Assertions -- 2.3 Breakpoints -- 2.4 Profiling -- 2.5 Discussion -- 2.6 Conclusion -- References -- Chapter 3 Slicing-Based Techniques for Software Fault Localization -- 3.1 Introduction -- 3.2 Static Slicing-Based Fault Localization -- 3.2.1 Introduction -- 3.2.2 Program Slicing Combined with Equivalence Analysis -- 3.2.3 Further Application -- 3.3 Dynamic Slicing-Based Fault Localization -- 3.3.1 Dynamic Slicing and Backtracking Techniques -- 3.3.2 Dynamic Slicing and Model-Based Techniques -- 3.3.3 Critical Slicing -- 3.3.3.1 Relationships Between Critical Slices (CS) and Exact Dynamic Program Slices (DPS) -- 3.3.3.2 Relationship Between Critical Slices and Executed Static Program Slices -- 3.3.3.3 Construction Cost.
3.3.4 Multiple-Points Dynamic Slicing -- 3.3.4.1 BwS of an Erroneous Computed Value -- 3.3.4.2 FwS of Failure-Inducing Input Difference -- 3.3.4.3 BiS of a Critical Predicate -- 3.3.4.4 MPSs: Dynamic Chops -- 3.3.5 Execution Indexing -- 3.3.5.1 Concepts -- 3.3.5.2 Structural Indexing -- 3.3.6 Dual Slicing to Locate Concurrency Bugs -- 3.3.6.1 Trace Comparison -- 3.3.6.2 Dual Slicing -- 3.3.7 Comparative Causality: a Causal Inference Model Based on Dual Slicing -- 3.3.7.1 Property One: Relevance -- 3.3.7.2 Property Two: Sufficiency -- 3.3.8 Implicit Dependences to Locate Execution Omission Errors -- 3.3.9 Other Dynamic Slicing-Based Techniques -- 3.4 Execution Slicing-Based Fault Localization -- 3.4.1 Fault Localization Using Execution Dice -- 3.4.2 A Family of Fault Localization Heuristics Based on Execution Slicing -- 3.4.2.1 Heuristic I -- 3.4.2.2 Heuristic II -- 3.4.2.3 Heuristic III -- 3.4.3 Effective Fault Localization Based on Execution Slices and Inter-block Data Dependence -- 3.4.3.1 Augmenting a Bad D(1) -- 3.4.3.2 Refining a Good D(1) -- 3.4.3.3 An Incremental Debugging Strategy -- 3.4.4 Other Execution Slicing-Based Techniques in Software Fault Localization -- 3.5 Discussions -- 3.6 Conclusion -- 3.6 Notes -- References -- Chapter 4 Spectrum-Based Techniques for Software Fault Localization -- 4.1 Introduction -- 4.2 Background and Notation -- 4.2.1 Similarity Coefficient-Based Fault Localization -- 4.2.2 An Example of Using Similarity Coefficient to Compute Suspiciousness -- 4.3 Insights of Some Spectra-Based Metrics -- 4.4 Equivalence Metrics -- 4.4.1 Applicability of the Equivalence Relation to Other Fault Localization Techniques -- 4.4.2 Applicability Beyond Fault Localization -- 4.5 Selecting a Good Suspiciousness Function (Metric) -- 4.5.1 Cost of Using a Metric -- 4.5.2 Optimality for Programs with a Single Bug.
4.5.3 Optimality for Programs with Deterministic Bugs -- 4.6 Using Spectrum-Based Metrics for Fault Localization -- 4.6.1 Spectrum-Based Metrics for Fault Localization -- 4.6.2 Refinement of Spectra-Based Metrics -- 4.7 Empirical Evaluation Studies of SBFL Metrics -- 4.7.1 The Construction of D* -- 4.7.2 An Illustrative Example -- 4.7.3 A Case Study Using D* -- 4.7.3.1 Subject Programs -- 4.7.3.2 Fault Localization Techniques Used in Comparisons -- 4.7.3.3 Evaluation Metrics and Criteria -- 4.7.3.3.1 The EXAM Score -- 4.7.3.3.2 Cumulative Number of Statements Examined -- 4.7.3.3.3 Wilcoxon Signed-Rank Test -- 4.7.3.4 Statement with Same Suspiciousness Values -- 4.7.3.5 Results -- 4.7.3.6 Effectiveness of D* with Different Values of * -- 4.7.3.7 D* Versus Other Fault Localization Techniques -- 4.7.3.8 Programs with Multiple Bugs -- 4.7.3.8.1 The Expense Score-Based Approach -- 4.7.3.8.2 The One-Bug-at-a-Time Approach -- 4.7.3.9 Discussion -- 4.7.3.9.1 Intuition -- 4.7.3.9.2 Best and Worst Effectiveness Versus Other Alternatives -- 4.7.3.9.3 Threats to Validity -- 4.8 Conclusion -- 4.8 Notes -- References -- Chapter 5 Statistics-Based Techniques for Software Fault Localization -- 5.1 Introduction -- 5.1.1 Tarantula -- 5.1.2 How It Works -- 5.2 Working with Statements -- 5.2.1 Techniques Under the Same Problem Settings -- 5.2.2 Statistical Variances -- 5.3 Working with Non-statements -- 5.3.1 Predicate: a Popular Trend -- 5.3.2 BPEL: a Sample Application -- 5.4 Purifying the Input -- 5.4.1 Coincidental Correctness Issue -- 5.4.2 Class Balance Consideration -- 5.5 Reinterpreting the Output -- 5.5.1 Revealing Fault Number -- 5.5.2 Noise Reduction -- 5.5.2 Notes -- References -- Chapter 6 Machine Learning-Based Techniques for Software Fault Localization -- 6.1 Introduction -- 6.2 BP Neural Network-Based Fault Localization.
6.2.1 Fault Localization with a BP Neural Network -- 6.2.2 Reduce the Number of Candidate Suspicious Statements -- 6.3 RBF Neural Network-Based Fault Localization -- 6.3.1 RBF Neural Networks -- 6.3.2 Methodology -- 6.3.2.1 Fault Localization Using an RBF Neural Network -- 6.3.2.2 Training of the RBF Neural Network -- 6.3.2.3 Definition of a Weighted Bit-Comparison-Based Dissimilarity -- 6.4 C4.5 Decision Tree-Based Fault Localization -- 6.4.1 Category-Partition for Rule Induction -- 6.4.2 Rule Induction Algorithms -- 6.4.3 Statement Ranking Strategies -- 6.4.3.1 Revisiting Tarantula -- 6.4.3.2 Ranking Statements Based on C4.5 Rules -- 6.4.3.2.1 Heuristic -- 6.4.3.2.2 Computing a Statement Ranking -- 6.4.3.2.3 Rule Selection -- 6.5 Applying Simulated Annealing with Statement Pruning for an SBFL Formula -- 6.6 Conclusion -- 6.6 Notes -- References -- Chapter 7 Data Mining-Based Techniques for Software Fault Localization -- 7.1 Introduction -- 7.2 Formal Concept Analysis and Association Rules -- 7.2.1 Formal Concept Analysis -- 7.2.2 Association Rules -- 7.3 Data Mining for Fault Localization -- 7.3.1 Failure Rules -- 7.3.2 Failure Lattice -- 7.4 The Failure Lattice for Multiple Faults -- 7.4.1 Dependencies Between Faults -- 7.4.2 Example -- 7.5 Discussion -- 7.5.1 The Structure of the Execution Traces -- 7.5.2 Union Model -- 7.5.3 Inter section Model -- 7.5.4 Nearest Neighbor -- 7.5.5 Delta Debugging -- 7.5.6 From the Trace Context to the Failure Context -- 7.5.7 The Structure of Association Rules -- 7.5.8 Multiple Faults -- 7.6 Fault Localization Using N-gram Analysis -- 7.6.1 Background -- 7.6.1.1 Execution Sequence -- 7.6.1.2 N-gram. Analysis -- 7.6.1.3 Linear Execution Blocks -- 7.6.1.4 Association Rule Mining -- 7.6.2 Methodology -- 7.6.3 Conclusion -- 7.7 Fault Localization for GUI Software Using N-gram Analysis -- 7.7.1 Background.
7.7.1.1 Representation of the GUI and Its Operations -- 7.7.1.2 Event Handler -- 7.7.1.3 N-gram -- 7.7.2 Association Rule Mining -- 7.7.3 Methodology -- 7.7.3.1 General Approach -- 7.7.3.2 N-gram Fault Localization Algorithm -- 7.8 Conclusion -- 7.8 Notes -- References -- Chapter 8 Information Retrieval-Based Techniques for Software Fault Localization -- 8.1 Introduction -- 8.2 General IR-Based Fault Localization Process -- 8.3 Fundamental Information Retrieval Techniques for Software Fault Localization -- 8.3.1 Vector Space Model -- 8.3.2 Topic Modeling -- 8.3.3 Word Embedding -- 8.4 Evaluation Metrics -- 8.4.1 Top-k Prediction Accuracy -- 8.4.2 Mean Reciprocal Rank (MRR) -- 8.4.3 Mean Average Precision (MAP) -- 8.5 Techniques for Different Scenarios -- 8.5.1 Text of Current Bug Report Only -- 8.5.1.1 VSM Variants -- 8.5.1.2 Topic Modeling -- 8.5.2 Text and History -- 8.5.2.1 VSM Variants -- 8.5.2.2 Topic Modeling -- 8.5.2.3 Deep Learning -- 8.5.3 Text and Stack/Execution Traces -- 8.6 Empirical Studies -- 8.7 Miscellaneous -- 8.8 Conclusion -- 8.8 Notes -- References -- Chapter 9 Model-Based Techniques for Software Fault Localization -- 9.1 Introduction -- 9.2 Basic Definitions and Algorithms -- 9.2.1 Algorithms for MBD -- 9.3 Modeling for MBD -- 9.3.1 The Value-Based Model -- 9.3.2 The Dependency-Based Model -- 9.3.3 Approximation Models for Debugging -- 9.3.4 Other Modeling Approaches -- 9.4 Application Areas -- 9.5 Hybrid Approaches -- 9.6 Conclusion -- 9.6 Notes -- References -- Chapter 10 Software Fault Localization in Spreadsheets -- 10.1 Motivation -- 10.2 Definition of the Spreadsheet Language -- 10.3 Cones -- 10.4 Spectrum-Based Fault Localization -- 10.5 Model-Based Spreadsheet Debugging -- 10.6 Repair Approaches -- 10.7 Checking Approaches -- 10.8 Testing -- 10.9 Conclusion -- 10.9 Notes -- References.
Chapter 11 Theoretical Aspects of Software Fault Localization.
Record Nr. UNINA-9910830449103321
Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
How not to program in C++ [[electronic resource] ] : 111 broken programs and 3 working ones, or why does 2+2 = 5986? / / Steve Oualline
How not to program in C++ [[electronic resource] ] : 111 broken programs and 3 working ones, or why does 2+2 = 5986? / / Steve Oualline
Autore Oualline Steve
Pubbl/distr/stampa San Francisco, : No Starch Press, c2003
Descrizione fisica 1 online resource (281 p.)
Disciplina 005.13/3
Soggetto topico C++ (Computer program language)
Debugging in computer science
Error analysis (Mathematics)
Soggetto genere / forma Electronic books.
ISBN 1-59327-015-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preliminaries; Dedication; Table Of Contents; Introduction; In The Beginning; Starting Out On The Wrong Foot; One Character Wonders; Everyday Problems; C Code, C Code Break; Premature Breakage; Classes With No Class; Expert Confusion; Portage To Hell; A Few Working Programs; Threaded, Embedded - Dreaded
Record Nr. UNINA-9910456334303321
Oualline Steve  
San Francisco, : No Starch Press, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
How not to program in C++ [[electronic resource] ] : 111 broken programs and 3 working ones, or why does 2+2 = 5986? / / Steve Oualline
How not to program in C++ [[electronic resource] ] : 111 broken programs and 3 working ones, or why does 2+2 = 5986? / / Steve Oualline
Autore Oualline Steve
Pubbl/distr/stampa San Francisco, : No Starch Press, c2003
Descrizione fisica 1 online resource (281 p.)
Disciplina 005.13/3
Soggetto topico C++ (Computer program language)
Error analysis (Mathematics)
Debugging in computer science
ISBN 1-59327-015-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preliminaries; Dedication; Table Of Contents; Introduction; In The Beginning; Starting Out On The Wrong Foot; One Character Wonders; Everyday Problems; C Code, C Code Break; Premature Breakage; Classes With No Class; Expert Confusion; Portage To Hell; A Few Working Programs; Threaded, Embedded - Dreaded
Record Nr. UNINA-9910780127103321
Oualline Steve  
San Francisco, : No Starch Press, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
How not to program in C++ : 111 broken programs and 3 working ones, or why does 2+2 = 5986? / / Steve Oualline
How not to program in C++ : 111 broken programs and 3 working ones, or why does 2+2 = 5986? / / Steve Oualline
Autore Oualline Steve
Edizione [1st ed.]
Pubbl/distr/stampa San Francisco, : No Starch Press, c2003
Descrizione fisica 1 online resource (281 p.)
Disciplina 005.13/3
Soggetto topico C++ (Computer program language)
Error analysis (Mathematics)
Debugging in computer science
ISBN 1-59327-015-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preliminaries; Dedication; Table Of Contents; Introduction; In The Beginning; Starting Out On The Wrong Foot; One Character Wonders; Everyday Problems; C Code, C Code Break; Premature Breakage; Classes With No Class; Expert Confusion; Portage To Hell; A Few Working Programs; Threaded, Embedded - Dreaded
Record Nr. UNINA-9910825948803321
Oualline Steve  
San Francisco, : No Starch Press, c2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The IDA pro book [[electronic resource] ] : the unofficial guide to the world's most popular disassembler / / Chris Eagle
The IDA pro book [[electronic resource] ] : the unofficial guide to the world's most popular disassembler / / Chris Eagle
Autore Eagle Chris
Edizione [2nd ed.]
Pubbl/distr/stampa San Francisco, : No Starch Press, 2011
Descrizione fisica 1 online resource (954 p.)
Disciplina 004.2/4
004.24
005.14
Soggetto topico Disassemblers (Computer programs)
Debugging in computer science
Soggetto genere / forma Electronic books.
ISBN 1-59327-395-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The IDA Pro Book; PRAISE FOR THE FIRST EDITION OF THE IDA PRO BOOK; Acknowledgments; Introduction; I. Introduction to IDA; 1. Introduction to Disassembly; Disassembly Theory; The What of Disassembly; The Why of Disassembly; Malware Analysis; Vulnerability Analysis; Software Interoperability; Compiler Validation; Debugging Displays; The How of Disassembly; A Basic Disassembly Algorithm; Linear Sweep Disassembly; Recursive Descent Disassembly; Sequential Flow Instructions; Conditional Branching Instructions; Unconditional Branching Instructions; Function Call Instructions; Return Instructions
Summary2. Reversing and Disassembly Tools; Classification Tools; file; PE Tools; PEiD; Summary Tools; nm; ldd; objdump; otool; dumpbin; c++filt; Deep Inspection Tools; strings; Disassemblers; Summary; 3. IDA Pro Background; Hex-Rays' Stance on Piracy; Obtaining IDA Pro; IDA Versions; IDA Licenses; Purchasing IDA; Upgrading IDA; IDA Support Resources; Your IDA Installation; Windows Installation; OS X and Linux Installation; IDA and SELinux; 32-bit vs. 64-bit IDA; The IDA Directory Layout; Thoughts on IDA's User Interface; Summary; II. Basic IDA Usage; 4. Getting Started with IDA; Launching IDA
IDA File LoadingUsing the Binary File Loader; IDA Database Files; IDA Database Creation; Closing IDA Databases; Reopening a Database; Introduction to the IDA Desktop; Desktop Behavior During Initial Analysis; IDA Desktop Tips and Tricks; Reporting Bugs; Summary; 5. IDA Data Displays; The Principal IDA Displays; The Disassembly Window; IDA Graph View; IDA Text View; The Functions Window; The Output Window; Secondary IDA Displays; The Hex View Window; The Exports Window; The Imports Window; The Structures Window; The Enums Window; Tertiary IDA Displays; The Strings Window; The Names Window
The Segments WindowThe Signatures Window; The Type Libraries Window; The Function Calls Window; The Problems Window; Summary; 6. Disassembly Navigation; Basic IDA Navigation; Double-Click Navigation; Jump to Address; Navigation History; Stack Frames; Calling Conventions; The C Calling Convention; The Standard Calling Convention; The fastcall Convention for x86; C++ Calling Conventions; Other Calling Conventions; Local Variable Layout; Stack Frame Examples; IDA Stack Views; Searching the Database; Text Searches; Binary Searches; Summary; 7. Disassembly Manipulation; Names and Naming
Parameters and Local VariablesNamed Locations; Register Names; Commenting in IDA; Regular Comments; Repeatable Comments; Anterior and Posterior Lines; Function Comments; Basic Code Transformations; Code Display Options; Formatting Instruction Operands; Manipulating Functions; Creating New Functions; Deleting Functions; Function Chunks; Function Attributes; Stack Pointer Adjustments; Converting Data to Code (and Vice Versa); Basic Data Transformations; Specifying Data Sizes; Working with Strings; Specifying Arrays; Summary; 8. Datatypes and Data Structures; Recognizing Data Structure Use
Array Member Access
Record Nr. UNINA-9910457535903321
Eagle Chris  
San Francisco, : No Starch Press, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The IDA pro book [[electronic resource] ] : the unofficial guide to the world's most popular disassembler / / Chris Eagle
The IDA pro book [[electronic resource] ] : the unofficial guide to the world's most popular disassembler / / Chris Eagle
Autore Eagle Chris
Edizione [2nd ed.]
Pubbl/distr/stampa San Francisco, : No Starch Press, 2011
Descrizione fisica 1 online resource (954 p.)
Disciplina 004.2/4
004.24
005.14
Soggetto topico Disassemblers (Computer programs)
Debugging in computer science
ISBN 1-59327-395-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The IDA Pro Book; PRAISE FOR THE FIRST EDITION OF THE IDA PRO BOOK; Acknowledgments; Introduction; I. Introduction to IDA; 1. Introduction to Disassembly; Disassembly Theory; The What of Disassembly; The Why of Disassembly; Malware Analysis; Vulnerability Analysis; Software Interoperability; Compiler Validation; Debugging Displays; The How of Disassembly; A Basic Disassembly Algorithm; Linear Sweep Disassembly; Recursive Descent Disassembly; Sequential Flow Instructions; Conditional Branching Instructions; Unconditional Branching Instructions; Function Call Instructions; Return Instructions
Summary2. Reversing and Disassembly Tools; Classification Tools; file; PE Tools; PEiD; Summary Tools; nm; ldd; objdump; otool; dumpbin; c++filt; Deep Inspection Tools; strings; Disassemblers; Summary; 3. IDA Pro Background; Hex-Rays' Stance on Piracy; Obtaining IDA Pro; IDA Versions; IDA Licenses; Purchasing IDA; Upgrading IDA; IDA Support Resources; Your IDA Installation; Windows Installation; OS X and Linux Installation; IDA and SELinux; 32-bit vs. 64-bit IDA; The IDA Directory Layout; Thoughts on IDA's User Interface; Summary; II. Basic IDA Usage; 4. Getting Started with IDA; Launching IDA
IDA File LoadingUsing the Binary File Loader; IDA Database Files; IDA Database Creation; Closing IDA Databases; Reopening a Database; Introduction to the IDA Desktop; Desktop Behavior During Initial Analysis; IDA Desktop Tips and Tricks; Reporting Bugs; Summary; 5. IDA Data Displays; The Principal IDA Displays; The Disassembly Window; IDA Graph View; IDA Text View; The Functions Window; The Output Window; Secondary IDA Displays; The Hex View Window; The Exports Window; The Imports Window; The Structures Window; The Enums Window; Tertiary IDA Displays; The Strings Window; The Names Window
The Segments WindowThe Signatures Window; The Type Libraries Window; The Function Calls Window; The Problems Window; Summary; 6. Disassembly Navigation; Basic IDA Navigation; Double-Click Navigation; Jump to Address; Navigation History; Stack Frames; Calling Conventions; The C Calling Convention; The Standard Calling Convention; The fastcall Convention for x86; C++ Calling Conventions; Other Calling Conventions; Local Variable Layout; Stack Frame Examples; IDA Stack Views; Searching the Database; Text Searches; Binary Searches; Summary; 7. Disassembly Manipulation; Names and Naming
Parameters and Local VariablesNamed Locations; Register Names; Commenting in IDA; Regular Comments; Repeatable Comments; Anterior and Posterior Lines; Function Comments; Basic Code Transformations; Code Display Options; Formatting Instruction Operands; Manipulating Functions; Creating New Functions; Deleting Functions; Function Chunks; Function Attributes; Stack Pointer Adjustments; Converting Data to Code (and Vice Versa); Basic Data Transformations; Specifying Data Sizes; Working with Strings; Specifying Arrays; Summary; 8. Datatypes and Data Structures; Recognizing Data Structure Use
Array Member Access
Record Nr. UNINA-9910781946803321
Eagle Chris  
San Francisco, : No Starch Press, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui