decompiler


Also found in: Dictionary, Wikipedia.
Related to decompiler: Disassembler

decompiler

A program that converts machine language back into a high-level source language. The resulting code may be very difficult to maintain as variables and routines are named generically: A0001, A0002, etc. See disassembler.
Mentioned in ?
References in periodicals archive ?
While this is the inaugural release of dotPeek as a standalone tool, the underlying decompiler technology has been publicly available for quite a while.
17 /PRNewswire/ -- Hex-Rays sprl of Belgium announced today the commercial release of its long-awaited decompiler for binary software analysis.
A decompiler built into the software allows previous PSD designs to be uploaded, decompiled and modified.
PSD designs can be uploaded, decompiled and modified using PSDsoft's decompiler.
A decompiler allows previous PSD designs to be uploaded, decompiled and modified.
SAN FRANCISCO--(BUSINESS WIRE)--March 24, 1998--Ahpah Software today released SourceAgain Professional, the premier Java decompiler, providing developers unprecedented capabilities for analyzing Java bytecode.
Includes the Help-To-Word(TM) Help Decompiler, WinHelp Inspector(TM), WinHelp BugHunter(TM), WinHelp Graphics Locator(TM), and WinHelp Graphics Library(TM).
10, 1998--Ahpah Software today held the first public demonstration of its new SourceAgain Professional Java decompiler, revealing unprecedented capabilities and performance in a Java decompiler.
2, 1997--Ahpah Software announces SourceAgain(TM), the professional's Java(TM) decompiler.
Includes the Help-To-Word Help Decompiler, WinHelp Inspector, WinHelp BugHunter, WinHelp Graphics Locator, WinHelp Graphics Library, and WinHelp Style Guide.
Help-to-Word, the Only Help Decompiler in the World
No matter from what threats software is protected, for example copying or stealing algorithms, attackers attempt to crack the protection by several methods including reverse engineering, including disassembly and decompilation, debuggers, disassemblers, decompilers, emulators, simulators and spoofing attacks [7].