它们是从计算机程序设计原料——反汇编代码、API调用、内存地址和子程序创建而来的视觉想像。
They are visual imaginings built from the raw stuff of computer programming - disassembled code, API calls, memory addresses and subroutines.
Ksymoops反汇编代码部分,指出发生错误的指令,并显示一个跟踪部分表明代码如何被调用。
Ksymoops disassembles the code section, points to the failing instruction, and displays a trace section that shows how the code was called.
如果你已经对代码进行反汇编,代码就可以提供数据位置的蛛丝马迹。
If you have disassembled the code, the code can provide hints as to the location of data.
图6 - 8如图所示。之前反汇编的代码访问了数据。
Figure 6-8 - Data are accessed by previously disassembled code, as shown here.
图6 - 7反汇编器处理二进制代码并生成如图所示的汇编代码。
Figure 6-7 - a disassembler takes binary code and creates assembly code that looks like this.
大多数的反汇编器(Disassembler)可以发现这样的代码,并把它标记出来,之后反汇编器会显示其翻译出来的汇编语言形式的指令。
Most disassemblers can find this code and mark it as code, and they’ll subsequently show you the instructions that the code translates to in assembly language.
分析一个二进制代码的通常方式有以下几个阶段:反汇编,过程抽象,控制流程图生成,数据流分析和签名验证。
The common approach for analysing a binary consists of the following stages: assembly, procedure abstraction, control flow graph generation, data flow analysis, and property verification.
在“反汇编”窗口中,单击代码行,然后从“调试”菜单中选择“切换断点”。
In the Disassembly window, click on a line of code and choose Toggle Breakpoint from the Debug menu.
“反汇编”窗口显示与编译器所创建的指令对应的汇编代码。
TheDisassembly window shows assembly code corresponding to the instructions created by the compiler.
代码在当前位置停止执行,但调试器不能显示当前位置的源代码或反汇编。
The debugger cannot display source code or disassembly for the current location where execution has stopped.
代码在当前位置停止执行,但调试器不能显示当前位置的源代码或反汇编。
The debugger cannot display source code or disassembly for the current location where execution has stopped.
应用推荐