Professional Documents
Culture Documents
Analysis of malware
Analysis of closed-source software for
vulnerabilities
Analysis of closed-source software for
interoperability
Analysis of compiler-generated code to
validate compiler performance/ correctness
Display of program instructions while
debugging
When:
analysis of ROM images
exploit payloads that may have been extracted
from network packet captures or log files
Toolbar
Nav. band
Data displays
Function
window
Disassembly view
Output window