Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Watch a conference presentation from USENIX Security '24 exploring comprehensive research on C decompiler output fidelity issues. Examine how researchers from Carnegie Mellon University evaluated multiple decompilers to create a taxonomy of defects that impact reverse engineers' ability to analyze threats. Learn about their methodology comparing four different decompilers using open-coding techniques, and discover their findings on issues beyond just missing variable names and types. Understand their proposed approaches for improving decompiled code fidelity based on thematic analysis, aimed at enhancing reverse engineering productivity in computer security applications.