Skip to content

Commit

Permalink
update entry and contribution page
Browse files Browse the repository at this point in the history
  • Loading branch information
mahaloz committed May 1, 2024
1 parent ae0a8f0 commit 7771fde
Show file tree
Hide file tree
Showing 3 changed files with 11 additions and 6 deletions.
12 changes: 7 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,8 @@
</p>

The Decompilation Wiki is a collection of categorized information on all things decompilation.
From real-world applications to cutting-edge research papers, the Decompilation Wiki has it all! Join our Discord below for active community engagement. To get involved, see our [contribution guide](/docs/contributing.md).
From real-world applications to cutting-edge research papers, the Decompilation Wiki has it all! Join our Discord below for active community engagement. To get involved, see our [contribution guide](/docs/contributing.md).
The Decompilation Wiki is still early in development, so any contribution is appreciated!

[![Discord](https://dcbadge.vercel.app/api/server/hE7prXNt7t)](https://discord.gg/hE7prXNt7t)

Expand All @@ -15,7 +16,7 @@ However, most people agree that decompilation is the reversal of compilation.
By that definition, **decompilation is the process of turning low-level machine code into a higher-level representation.**

In many cases, this means turning machine code, like [x86 assembly](https://en.wikipedia.org/wiki/X86_assembly_language), into source code, like [C](https://en.wikipedia.org/wiki/C_(programming_language)).
This methodology can also be applied to languages like [Java](https://en.wikipedia.org/wiki/Java_(programming_language)), which create [custom byte codes](https://en.wikipedia.org/wiki/Java_bytecode).
This methodology can also be applied to languages like [Java](https://en.wikipedia.org/wiki/Java_(programming_language)), which create [bytecode](https://en.wikipedia.org/wiki/Java_bytecode).
The difficulty and accuracy of decompilation can vary per language target[^1].

Decompilation has wide applications across cyber security, including:
Expand All @@ -24,9 +25,9 @@ Decompilation has wide applications across cyber security, including:
- vulnerability discovery (the understanding of program flaws)
- malware classification
- program repair
- [much more...](/applications/introduction/).
- [and much more...](/docs/applications/overview/)

## Wiki Goals
## Wiki Goals?
This wiki has two main goals:

1. Making decompilation knowledge more accessible to new-comers in the field
Expand All @@ -45,8 +46,9 @@ The Decompilation Wiki was started by [Zion Leonahenahe Basque](https://zionbasq
The wiki is highly inspired by the following sources:

- [Program-Transformation.org](https://www.program-transformation.org/): a wiki on program transformations, including some decompilation.
- [CTF Wiki](https://ctf-wiki.org/): a wiki for Capture the Flag, inspiring this layout and design
- [CTF Wiki](https://ctf-wiki.org/): a wiki for Capture the Flag, inspiring this layout and design.
- ["30 Years into Scientific Binary Decompilation"](https://www.youtube.com/watch?v=XasallkPQIA), Dr. Ruoyu (Fish) Wang: a source of information on decompilers.

Additionally, the wiki is due in large part to the support and advisement of Zion's PhD committee: [Dr. Ruoyu (Fish) Wang](https://ruoyuwang.me/), [Dr. Yan Shoshitaishvili](http://yancomm.net/), [Dr. Adam Doupé](https://adamdoupe.com/), and [Dr. Christina Cifuentes](https://labs.oracle.com/pls/apex/f?p=labs:bio:0:21).

[^1]: Yakdan, Khaled, et al. ["Helping johnny to analyze malware: A usability-optimized decompiler and malware analysis user study."](https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7546501&casa_token=Pl69lA763yoAAAAA:0rH6AIEbiBhbUGGaSvJvhaYeFEaWPnIifVHceQTGkd_k4NQK6EDH_zcytY-I-W6OE5oHbdU) 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016.
1 change: 1 addition & 0 deletions docs/contributing.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
# Contributing Guide
Thank you for wanting to contribute to the Decompilation Wiki!
Below are some simple tips to make requests for changes easier to review for the community.
Currently, the wiki is still in early development, so any PR is welcome.

If there are ever questions on good contributions, opening issues and discussion on Discord are the best mediums for feedback.

Expand Down
4 changes: 3 additions & 1 deletion docs/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@

The Decompilation Wiki is a collection of categorized information on all things decompilation.
From real-world applications to cutting-edge research papers, the Decompilation Wiki has it all! Join our Discord below for active community engagement. To get involved, see our [contribution guide](/contributing).
The Decompilation Wiki is still early in development, so any contribution is appreciated!

[![Discord](https://dcbadge.vercel.app/api/server/hE7prXNt7t)](https://discord.gg/hE7prXNt7t)

Expand All @@ -15,7 +16,7 @@ However, most people agree that decompilation is the reversal of compilation.
By that definition, **decompilation is the process of turning low-level machine code into a higher-level representation.**

In many cases, this means turning machine code, like [x86 assembly](https://en.wikipedia.org/wiki/X86_assembly_language), into source code, like [C](https://en.wikipedia.org/wiki/C_(programming_language)).
This methodology can also be applied to languages like [Java](https://en.wikipedia.org/wiki/Java_(programming_language)), which create [custom byte codes](https://en.wikipedia.org/wiki/Java_bytecode).
This methodology can also be applied to languages like [Java](https://en.wikipedia.org/wiki/Java_(programming_language)), which create [bytecode](https://en.wikipedia.org/wiki/Java_bytecode).
The difficulty and accuracy of decompilation can vary per language target[^1].

Decompilation has wide applications across cyber security, including:
Expand Down Expand Up @@ -48,5 +49,6 @@ The wiki is highly inspired by the following sources:
- [CTF Wiki](https://ctf-wiki.org/): a wiki for Capture the Flag, inspiring this layout and design.
- ["30 Years into Scientific Binary Decompilation"](https://www.youtube.com/watch?v=XasallkPQIA), Dr. Ruoyu (Fish) Wang: a source of information on decompilers.

Additionally, the wiki is due in large part to the support and advisement of Zion's PhD committee: [Dr. Ruoyu (Fish) Wang](https://ruoyuwang.me/), [Dr. Yan Shoshitaishvili](http://yancomm.net/), [Dr. Adam Doupé](https://adamdoupe.com/), and [Dr. Christina Cifuentes](https://labs.oracle.com/pls/apex/f?p=labs:bio:0:21).

[^1]: Yakdan, Khaled, et al. ["Helping johnny to analyze malware: A usability-optimized decompiler and malware analysis user study."](https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7546501&casa_token=Pl69lA763yoAAAAA:0rH6AIEbiBhbUGGaSvJvhaYeFEaWPnIifVHceQTGkd_k4NQK6EDH_zcytY-I-W6OE5oHbdU) 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016.

0 comments on commit 7771fde

Please sign in to comment.