Flag: Tornado! Hurricane!

 Forums >>  Brainstorms - General  >>  Executable analysis for critical path

Topic created on: September 10, 2013 02:15 CDT by hassaanshakil .

Hi,
Kindly allow me to explain the problem that I am facing (this post may become long so apologies in advance). Basically the problem is a part of my MS thesis and I want to know if reverse engineering can be used to solve it.

I have implemented different algorithms in C++ and generated executable files (using MS Visual Studio). I am not using any DLLs and the implementations are single threaded/process.

I need to extract following information from these executable files
1) Total number of operations/instructions in the code.
2) Length of the critical path i.e. longest sequential chain of instructions in the code.  

Let me give an example to clarify things

1. a = b + C;
2. c = d + e;
3. f = a + d;
4. g = c + f;

The program flow would be (1,3,2,4)
1 -> 3 ->
                 \
                4
                /
      2 ->

So there are four instructions in all and the critical path (longest sequential chain) is 3 instructions long (1, 3 & 4). Is it possible to do a similar analysis using disassembled executable?


Reverse engineering is not my forte but I am willing to put in required effort if the experts (being you guys) tell me that it can get the job done. I have strong programming skills so programming is not an issue.

Thanks.

  cod     September 11, 2013 05:07.12 CDT
You can try to perform your analysis using Intel PIN [http://software.intel.com/en-us/articles/pintool-downloads]

  hassaanshakil   September 16, 2013 00:33.33 CDT
> cod: You can try to perform your analysis using Intel PIN [http://software.intel.com/en-us/articles/pintool-downloads]

Thanks a lot. I does look promising.

Note: Registration is required to post to the forums.

There are 31,320 total registered users.


Recently Created Topics
[help] Unpacking VMP...
Mar/12
Reverse Engineering ...
Jul/06
hi!
Jul/01
let 'IDAPython' impo...
Sep/24
set 'IDAPython' as t...
Sep/24
GuessType return une...
Sep/20
About retrieving the...
Sep/07
How to find specific...
Aug/15
How to get data depe...
Jul/07
Identify RVA data in...
May/06


Recent Forum Posts
Finding the procedur...
rolEYder
Question about debbu...
rolEYder
Identify RVA data in...
sohlow
let 'IDAPython' impo...
sohlow
How to find specific...
hackgreti
Problem with ollydbg
sh3dow
How can I write olly...
sh3dow
New LoadMAP plugin v...
mefisto...
Intel pin in loaded ...
djnemo
OOP_RE tool available?
Bl4ckm4n


Recent Blog Entries
halsten
Mar/14
Breaking IonCUBE VM

oleavr
Oct/24
Anatomy of a code tracer

hasherezade
Sep/24
IAT Patcher - new tool for ...

oleavr
Aug/27
CryptoShark: code tracer ba...

oleavr
Jun/25
Build a debugger in 5 minutes

More ...


Recent Blog Comments
nieo on:
Mar/22
IAT Patcher - new tool for ...

djnemo on:
Nov/17
Kernel debugger vs user mod...

acel on:
Nov/14
Kernel debugger vs user mod...

pedram on:
Dec/21
frida.github.io: scriptable...

capadleman on:
Jun/19
Using NtCreateThreadEx for ...

More ...


Imagery
SoySauce Blueprint
Jun 6, 2008

[+] expand

View Gallery (11) / Submit