|The Magic Algebra -- The Algebraic Approach to Control Flow Analysis email@example.com (Rock Brentwood) (2009-01-12)|
|An Algebra for Control Flow Analysis and Decompilation firstname.lastname@example.org (Mark) (2012-07-16)|
|Re: An Algebra for Control Flow Analysis and Decompilation email@example.com (2012-07-20)|
|DKIM-Signature:||v=1; a=rsa-sha256; c=simple; d=iecc.com; h=cc:from:subject:date:sender:message-id:references:mime-version:content-type:vbr-info; s=107eb.5004d4bb.k1207; firstname.lastname@example.org; bh=iKZdwr7LbXaFKUuz5vto2cMXWRcvavAfRwmj2T+5bFY=; b=CaJ5hEh8mnTzfQnpFOE0UH/eKRWz7T5JYZG3QtIpzR28mjnlCyucdjuiuveJcZxgYUSb08z9SWy5ETb7pgYUFF0mpgWB4C435uNWQkruzDpxMmt2xrA9ku1y5omeO+3rLZnNK4J3gWdgDXVTB+sBXOT/d9ZaicWEbq+MAvWu+HE=|
|VBR-Info:||md=iecc.com; mc=all; mv=dwl.spamhaus.org|
|Date:||Mon, 16 Jul 2012 18:00:33 -0700 (PDT)|
|Posted-Date:||16 Jul 2012 22:58:03 EDT|
This is a follow-up to an article I posted here (2009 Jan 12) titled
"The Magic Algebra -- The Algebraic Approach to Control Flow
I put a PDF version (with a few minor updates and corrections) on
DocStoc under "An Algebra for Control Flow Analysis"
A few notes of commentary following up on the earlier discussion: the
analysis this discusses was originally carried out as part of a
project (a "legacy code rescue") I was carrying out in 2000.
The key part of the process was the DE-compilation from binary into
high-level language code. A critical ingredient in this process just
happens to be the same that appears in any translation process: the
control flow analysis of the objects in the program and their usage.
The algebra is derived from first principles through an infinitary
form of the lambda calculus and leads to some non-trivial and even
counter-intuitive identities and relations.
(The company, itself, went defunct in 2011, apparently a victim of a
hostile takeover, but was resurrected later in 2011)
Return to the
Search the comp.compilers archives again.