Jakstab is an Abstract Interpretation-based, integrated disassembly and static analysis framework for designing analyses on executables and recovering reliable control flow graphs. It is designed to be adaptable to multiple hardware platforms using customized instruction decoding and processor specifications. It is written in Java, and in its current state supports x86 processors and 32-bit Windows PE or Linux ELF executables. Jakstab translates machine code to a low level intermediate language on the fly as it performs data flow analysis on the growing control flow graph. Data flow information is used to resolve branch targets and discover new code locations. Other analyses can either be implemented in Jakstab to run together with the main control flow reconstruction to improve precision of the disassembly, or they can work on the resulting preprocessed control flow graph
References in zbMATH (referenced in 4 articles )
Showing results 1 to 4 of 4.
- Beyer, Dirk; Gulwani, Sumit; Schmidt, David A.: Combining model checking and data-flow analysis (2018)
- Kinder, Johannes; Kravchenko, Dmitry: Alternating control flow reconstruction (2012)
- Bardin, Sébastien; Herrmann, Philippe; Védrine, Franck: Refinement-based CFG reconstruction from unstructured programs (2011)
- Kinder, Johannes; Veith, Helmut: Jakstab: A static analysis platform for binaries. Tool paper (2008) ioport