On 01/06/2016 10:43 AM, Shuai Wang wrote:
Dear list,
I am writing to ask how to use DynInst to recognize *function entry
points (memory addresses) in stripped binaries*.
I successfully installed the 32-bit DynInst 9.10, and I use a DynInst
script to iterate all the functions with the
Dear list,
I am writing to ask how to use DynInst to recognize *function entry points
(memory addresses) in stripped binaries*.
I successfully installed the 32-bit DynInst 9.10, and I use a DynInst
script to iterate all the functions with the following commands to *dump
all the function entry
Hello Bill,
Thank you for your prompt reply. Now I understand more about DynInst's this
functionality. I will let you know if I have any other questions.
Thanks again.
Sincerely,
Shuai
On Wed, Jan 6, 2016 at 3:22 PM, Bill Williams wrote:
> On 01/06/2016 02:15 PM, Shuai
Hello Bill,
Thank you for your information. I am wondering, besides the machine
learning-based method, is there any other mechanism implemented in DynInst?
For example, would you consider address 0x80102030 is a function entry
point if a call instruction (*call 0x80102030*) can be found in the