这是一款8位单片机的反汇编软件。
取消反汇编进度指示器弹出窗口的显示。
Suppresses the disassembly progress indicator pop-up window.
图1是反汇编程序生成的分帧输出的屏幕快照。
Figure 1 is a screen capture of the framed output generated by the disassembler.
反汇编清单显示了该main函数的汇编语言清单。
This disassembly listing shows the assembler-language listing of the main function.
我自己使用BCEL时,发现HTML反汇编程序特别有用。
In my own use of BCEL, I've found the HTML disassembler especially useful.
“反汇编”窗口显示与编译器所创建的指令对应的汇编代码。
TheDisassembly window shows assembly code corresponding to the instructions created by the compiler.
图6 - 7反汇编器处理二进制代码并生成如图所示的汇编代码。
Figure 6-7 - a disassembler takes binary code and creates assembly code that looks like this.
入口点依次可以通过(在反汇编阶段)鉴定CALL指令来标识。
The entry points in turn could be identified by identifying the CALL instructions (in the disassembly stage).
在托管应用程序中,反汇编限于一个函数,因而您可以正常滚动。
In managed applications, disassembly is limited to one function and you can scroll normally.
如果你已经对代码进行反汇编,代码就可以提供数据位置的蛛丝马迹。
If you have disassembled the code, the code can provide hints as to the location of data.
本文讨论了反汇编环境下高级语言函数及其参数、变量的识别问题。
This paper focuses on the identifications of high-level function, its arguments and variables under disassembling environment.
反汇编是程序分析与理解的基础,也是软件逆向工程的起点和关键。
Disassembly is the basis of program analysis and understanding, and is also the starting point for software reverse engineering.
如果指令对齐的时候出现错误,可以在反汇编的时候指定起始地址。
If there alignment error occurs, you can disassemble part of binary file by assigning the begin address.
除了它的反汇编能力外,你还可以用它来分析导入表,导出表及资源数据。
In addition to its disassembling ability, you can employ it to analyze import, export and resource data directories data.
代码在当前位置停止执行,但调试器不能显示当前位置的源代码或反汇编。
The debugger cannot display source code or disassembly for the current location where execution has stopped.
图6 - 7显示当二进制数据通过反汇编器后,翻译出来的汇编语言的样子。
Figure 6-7 shows what assembly language looks like once binary has been through a disassembler.
在“反汇编”窗口中,单击代码行,然后从“调试”菜单中选择“切换断点”。
In the Disassembly window, click on a line of code and choose Toggle Breakpoint from the Debug menu.
您不得对产品进行反向工程、反编译或反汇编,或试图获得对产品原码的访问权。
You may not reverse engineer, decompile or disassemble the Products or attempt to gain access to the source code for the Products.
反汇编:正是在这里,一个消息得到完全转换成XML格式,这样的消息传递引擎可以理解。
Disassembler: it is here that a message gets converted entirely into XML format so that the messaging engine can understand it.
如果您无法阅读汇编语言但又想充分利用“反汇编”窗口,请参考有关汇编语言编程的好书。
If you cannot read assembly language and want to take full advantage of the Disassembly window, consult a good book on assembly-language programming.
IDA是世界上最敏捷和多功能的反编译工具,被众多软件安全专家所熟知的交互的反汇编工具。
IDA is the Interactive disassembler: the world's smartest and most feature-full disassembler, which many software security specialists are familiar with.
Hopper反汇编工具,是逆向工程的工具,能够让你进行反汇编、反编译并且调试你的应用。
Hopper Disassembler, the reverse engineering tool that lets you disassemble, decompile and debug your applications.
它们是从计算机程序设计原料——反汇编代码、API调用、内存地址和子程序创建而来的视觉想像。
They are visual imaginings built from the raw stuff of computer programming - disassembled code, API calls, memory addresses and subroutines.
在Web环境中,可以将此结构反汇编成个别主题,并在生成的导航映射或目录表中保留其层次结构。
In a Web environment you could disassemble this structure into individual topics and preserve the hierarchy in a generated navigation map or table of contents.
Ksymoops反汇编代码部分,指出发生错误的指令,并显示一个跟踪部分表明代码如何被调用。
Ksymoops disassembles the code section, points to the failing instruction, and displays a trace section that shows how the code was called.
控制流转换可以加大程序的复杂度,降低程序的可读性,从而克制反汇编工具和攻击者对程序的解读。
Control transformation can increase program's complexities and make the program less readable so as to protect software from reverse engineering and the person who wants to read the source codes.
分析一个二进制代码的通常方式有以下几个阶段:反汇编,过程抽象,控制流程图生成,数据流分析和签名验证。
The common approach for analysing a binary consists of the following stages: assembly, procedure abstraction, control flow graph generation, data flow analysis, and property verification.
显然,无论反汇编你使用(我不承认,输出格式),因为ARM推出了UAL语法一直没有更新,所以一直拆卸旧助记符。
Clearly whatever disassembler you're using (I don't recognise that output format) hasn't been updated since ARM introduced the UAL syntax, so has disassembled to the old mnemonics.
结论与上面的相同:在付费35美元就可以使用Reflector的情况下,我们不值得为编写反编译器或者反汇编器浪费时间。
Same conclusion: it isn’t worth my time to write a decompiler/disassembler when Reflector is available for $35.
结论与上面的相同:在付费35美元就可以使用Reflector的情况下,我们不值得为编写反编译器或者反汇编器浪费时间。
Same conclusion: it isn’t worth my time to write a decompiler/disassembler when Reflector is available for $35.
应用推荐