Flag: Tornado! Hurricane!

 Forums >>  Brainstorms - General  >>  Executable analysis for critical path

Topic created on: September 10, 2013 02:15 CDT by hassaanshakil .

Hi,
Kindly allow me to explain the problem that I am facing (this post may become long so apologies in advance). Basically the problem is a part of my MS thesis and I want to know if reverse engineering can be used to solve it.

I have implemented different algorithms in C++ and generated executable files (using MS Visual Studio). I am not using any DLLs and the implementations are single threaded/process.

I need to extract following information from these executable files
1) Total number of operations/instructions in the code.
2) Length of the critical path i.e. longest sequential chain of instructions in the code.  

Let me give an example to clarify things

1. a = b + C;
2. c = d + e;
3. f = a + d;
4. g = c + f;

The program flow would be (1,3,2,4)
1 -> 3 ->
                 \
                4
                /
      2 ->

So there are four instructions in all and the critical path (longest sequential chain) is 3 instructions long (1, 3 & 4). Is it possible to do a similar analysis using disassembled executable?


Reverse engineering is not my forte but I am willing to put in required effort if the experts (being you guys) tell me that it can get the job done. I have strong programming skills so programming is not an issue.

Thanks.

  cod     September 11, 2013 05:07.12 CDT
You can try to perform your analysis using Intel PIN [http://software.intel.com/en-us/articles/pintool-downloads]

  hassaanshakil   September 16, 2013 00:33.33 CDT
> cod: You can try to perform your analysis using Intel PIN [http://software.intel.com/en-us/articles/pintool-downloads]

Thanks a lot. I does look promising.

Note: Registration is required to post to the forums.

There are 31,056 total registered users.


Recently Created Topics
Ultimate Hacking Cha...
Jun/21
CreateMutex
May/31
let 'IDAPython' impo...
Sep/24
set 'IDAPython' as t...
Sep/24
GuessType return une...
Sep/20
About retrieving the...
Sep/07
How to find specific...
Aug/15
How to get data depe...
Jul/07
Identify RVA data in...
May/06
Immunity Debugger Re...
Aug/03


Recent Forum Posts
How to find specific...
hackgreti
Problem with ollydbg
sh3dow
How can I write olly...
sh3dow
New LoadMAP plugin v...
mefisto...
Intel pin in loaded ...
djnemo
OOP_RE tool available?
Bl4ckm4n
OOP_RE tool available?
van7hu
Should binaries be n...
Kolisar
Problem with ollydbg
nullx42
!findtrampoline Immu...
skycrack


Recent Blog Entries
crystalwade
Jul/20
test

nieo
Mar/22
Android Application Reversing

halsten
Mar/14
Breaking IonCUBE VM

oleavr
Oct/24
Anatomy of a code tracer

hasherezade
Sep/24
IAT Patcher - new tool for ...

More ...


Recent Blog Comments
nieo on:
Mar/22
IAT Patcher - new tool for ...

djnemo on:
Nov/17
Kernel debugger vs user mod...

acel on:
Nov/14
Kernel debugger vs user mod...

pedram on:
Dec/21
frida.github.io: scriptable...

capadleman on:
Jun/19
Using NtCreateThreadEx for ...

More ...


Imagery
SoySauce Blueprint
Jun 6, 2008

[+] expand

View Gallery (11) / Submit