Introduction - If you have any usage issues, please Google them yourself
Over the last seven years, we have developed static-analysis methods to recover a good approximation to the variables and dynamically allocated memory objects of a stripped executable, and to track the flow of values through them. It is relatively easy to track the effects of an instruction operand that refers to a global address (i.e., an access to a global variable) or that uses a stack-frame offset (i.e., an access to a local scalar variable via the frame pointer or stackpointer). In our work, our algorithms are able to provide useful information for close to 100 of such “direct” uses and defs.