Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Interactive Disassembler
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{short description|Software reverse engineering tool}} {{multiple issues| {{more footnotes needed|date=September 2013}} {{third-party|date=September 2013}} }} {{Infobox software | name = Interactive Disassembler | logo = | screenshot = Mme de Maintenon.jpg | caption = Portrait of [[Françoise d'Aubigné]], whose image is used as the IDA logo | collapsible = | author = [[Ilfak Guilfanov]] | developer = Hex-Rays | released = {{Start date and age|1991|05|21}}<ref>{{Cite web |last=Czokow |first=Geoffrey |date=2021-05-20 |title=IDA: celebrating 30 years of binary analysis innovation |url=https://hex-rays.com/blog/ida-celebrating-30-years-of-binary-analysis-innovation/ |access-date=2023-03-19 |website=Hex-Rays |language=en}}</ref> | latest release version = 9.1<ref>{{Cite web |url=https://docs.hex-rays.com/release-notes/9_1|title=IDA 9.1 |access-date=March 29, 2024 }}</ref> | latest release date = {{Start date and age|2025|2|28}} | latest preview version = | latest preview date = | programming language = [[C++]]<ref>{{Cite web |url=http://www.hex-rays.com/ |title=Hex-rays Home |access-date=2008-03-31 |archive-date=2024-05-26 |archive-url=https://web.archive.org/web/20240526003338/https://hex-rays.com/ |url-status=live }}</ref> | operating system = [[Microsoft Windows]], [[Mac OS X]], and [[Linux]] | platform = | size = | language = [[English language|English]], [[Russian language|Russian]] | genre = [[Disassembler]], [[Decompiler]] | license = Proprietary | website = {{URL|https://hex-rays.com/ida-pro/}} }} The '''Interactive Disassembler''' ('''IDA''') is a [[disassembler]] for [[software|computer software]] which generates [[assembly language]] [[source code]] from [[Machine code|machine-executable code]]. It supports a variety of [[executable|executable format]]s for different [[Central processing unit|processor]]s and [[operating system]]s. It can also be used as a [[debugger]] for [[Portable Executable|Windows PE]], [[Mac OS X]] [[Mach-O]], and [[Linux]] [[Executable and Linkable Format|ELF]] executables. A [[decompiler]] plug-in, which generates a high level, [[C (programming language)|C]] source code-like representation of the analysed program, is available at extra cost.<ref>{{Cite book |last=Eagle |first=Chris |url=https://www.worldcat.org/oclc/830164382 |title=The IDA Pro Book : the Unofficial Guide to the World's Most Popular Disassembler. |date=2011 |publisher=No Starch Press |isbn=978-1-59327-395-8 |edition=2nd |location=San Francisco |pages=500–502 |chapter=Chapter 23: Real-World IDA Plug-ins |oclc=830164382}}</ref><ref>{{Cite web |title=Hex-Rays Decompiler |url=https://hex-rays.com/decompiler/ |access-date=2023-03-18 |website=hex-rays.com}}</ref> IDA is used widely in software [[reverse engineering]], including for [[malware analysis]]<ref>{{Cite web |last=Staff |first=S. C. |date=2017-09-11 |title=Hex-Rays IDA Pro |url=https://www.scmagazine.com/product-test/content/hex-rays-ida-pro |access-date=2023-03-13 |website=SC Media |language=en}}</ref><ref>{{Cite book |last=Sikorski |first=Michael |url=https://www.worldcat.org/oclc/830164262 |title=Practical Malware Analysis : a Hands-On Guide to Dissecting Malicious Software. |date=2012 |publisher=No Starch Press |others=Andrew Honig |isbn=978-1-59327-430-6 |location=San Francisco |chapter=Chapter 5. IDA Pro |oclc=830164262}}</ref> and [[Vulnerability (computing)|software vulnerability]] research.<ref>{{Cite book |last1=Shoshitaishvili |first1=Yan |last2=Wang |first2=Ruoyu |last3=Salls |first3=Christopher |last4=Stephens |first4=Nick |last5=Polino |first5=Mario |last6=Dutcher |first6=Andrew |last7=Grosen |first7=John |last8=Feng |first8=Siji |last9=Hauser |first9=Christophe |last10=Kruegel |first10=Christopher |last11=Vigna |first11=Giovanni |chapter=SOK: (State of) the Art of War: Offensive Techniques in Binary Analysis |date=2016-05-22 |title=2016 IEEE Symposium on Security and Privacy (SP) |chapter-url=https://ieeexplore.ieee.org/document/7546500 |pages=138–157 |doi=10.1109/SP.2016.17|hdl=11311/1161277 |isbn=978-1-5090-0824-7 |hdl-access=free }}</ref><ref>{{Cite journal |last1=Guo |first1=Wei |last2=Wei |first2=Qiang |last3=Wu |first3=Qianqiong |last4=Guo |first4=Zhimin |date=2022-04-01 |title=CSChecker : A binary taint-based vulnerability detection method based on static taint analysis |journal=Journal of Physics: Conference Series |volume=2258 |issue=1 |pages=012069 |doi=10.1088/1742-6596/2258/1/012069 |issn=1742-6588|doi-access=free |bibcode=2022JPhCS2258a2069G }}</ref> IDA's decompiler is one of the most popular and widely used decompilation frameworks,<ref name=":02">{{Cite book |title=No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantics-Preserving Transformations |url=https://www.ndss-symposium.org/ndss2015/ndss-2015-programme/no-more-gotos-decompilation-using-pattern-independent-control-flow-structuring-and-semantics/ |access-date=2023-03-18 |website=NDSS Symposium |date=2015 |language=en-US |doi=10.14722/ndss.2015.23185 |last1=Yakdan |first1=Khaled |last2=Eschweiler |first2=Sebastian |last3=Gerhards-Padilla |first3=Elmar |last4=Smith |first4=Matthew |isbn=978-1-891562-38-9 }}</ref><ref name=":1">{{Cite journal |last1=Schulte |first1=Eric |last2=Ruchti |first2=Jason |last3=Noonan |first3=Matt |last4=Ciarletta |first4=David |last5=Loginov |first5=Alexey |date=2018 |title=Evolving Exact Decompilation |url=http://dx.doi.org/10.14722/bar.2018.23008 |journal=Proceedings 2018 Workshop on Binary Analysis Research |location=Reston, VA |publisher=Internet Society |doi=10.14722/bar.2018.23008|isbn=978-1-891562-50-1 }}</ref><ref name=":2">{{Cite book |last1=Liu |first1=Zhibo |last2=Wang |first2=Shuai |chapter=How far we have come: Testing decompilation correctness of C decompilers |date=2020-07-18 |title=Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis |chapter-url=https://doi.org/10.1145/3395363.3397370 |series=ISSTA 2020 |location=New York, NY, USA |publisher=Association for Computing Machinery |pages=475–487 |doi=10.1145/3395363.3397370 |isbn=978-1-4503-8008-9}}</ref> and IDA has been called the "de-facto industry standard" for program disassembly and static binary analysis.<ref>{{Cite book |last1=Di Federico |first1=Alessandro |last2=Payer |first2=Mathias |last3=Agosta |first3=Giovanni |chapter=Rev.ng: A unified binary analysis framework to recover CFGS and function boundaries |date=2017-02-05 |title=Proceedings of the 26th International Conference on Compiler Construction |chapter-url=https://doi.org/10.1145/3033019.3033028 |series=CC 2017 |location=New York, NY, USA |publisher=Association for Computing Machinery |pages=131–141 |doi=10.1145/3033019.3033028 |isbn=978-1-4503-5233-8 |quote="In an extensive evaluation, we test our [binary analysis] tool on binaries compiled for MIPS, ARM, and x86-64 using GCC and clang and compare them to the industry's state of the art tool, IDA Pro, and two well-known academic tools, BAP/ByteWeight and angr."}}</ref><ref>{{Cite web |last1=Garcia Prado |first1=Carlos |last2=Erickson |first2=Jon |date=April 10, 2018 |title=Solving Ad-hoc Problems with Hex-Rays API |url=https://www.fireeye.com/blog/threat-research/2018/04/solving-ad-hoc-problems-with-hex-rays-api.html |url-status=dead |archive-url=https://web.archive.org/web/20220602140613/https://www.fireeye.com/blog/threat-research/2018/04/solving-ad-hoc-problems-with-hex-rays-api.html |archive-date=June 2, 2022 |access-date=March 12, 2023 |website=FireEye Threat Research Blog |quote="IDA Pro is the de facto standard when it comes to binary reverse engineering."}}</ref><ref>{{Cite book |last=Andriesse |first=Dennis |url=https://www.worldcat.org/oclc/1050453850 |title=Practical binary analysis : build your own Linux tools for binary instrumentation, analysis, and disassembly |date=2019 |publisher=No Starch Press, Inc. |isbn=978-1-59327-913-4 |location=San Francisco, CA |chapter=Appendix C: List of Binary Analysis Tools |oclc=1050453850 |quote="This [IDA Pro] is the de facto industry-standard recursive disassembler."}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)