| Date: | Wed, 06 Jan 2016 15:15:10 -0500 |
|---|---|
| From: | Shuai Wang <wangshuai901@xxxxxxxxx> |
| Subject: | Re: [DynInst_API:] Function Entry Point Recognition in Stripped Binaries |
|
Hello Bill, Thank you for your information. I am wondering, besides the machine learning-based method, is there any other mechanism implemented in DynInst? For example, would you consider address 0x80102030 is a function entry point if a call instruction (call 0x80102030) can be found in the disassembled output? Sincerely, Shuai On Wed, Jan 6, 2016 at 12:08 PM, Bill Williams <bill@xxxxxxxxxxx> wrote:
|
| [← Prev in Thread] | Current Thread | [Next in Thread→] |
|---|---|---|
| ||
| Previous by Date: | Re: [DynInst_API:] Function Entry Point Recognition in Stripped Binaries, Bill Williams |
|---|---|
| Next by Date: | Re: [DynInst_API:] Function Entry Point Recognition in Stripped Binaries, Bill Williams |
| Previous by Thread: | Re: [DynInst_API:] Function Entry Point Recognition in Stripped Binaries, Bill Williams |
| Next by Thread: | Re: [DynInst_API:] Function Entry Point Recognition in Stripped Binaries, Bill Williams |
| Indexes: | [Date] [Thread] |