Software:Interactive Disassembler
Portrait of Françoise d'Aubigné, whose image is used as the IDA logo | |
Original author(s) | Ilfak Guilfanov |
---|---|
Developer(s) | Hex-Rays |
Initial release | May 21, 1991[1] |
Stable release | 8.3 [2]
/ June 2023 |
Written in | C++[3] |
Operating system | Microsoft Windows, Mac OS X, and Linux |
Available in | English, Russian |
Type | Disassembler, Decompiler |
License | Proprietary |
Website | hex-rays |
The Interactive Disassembler (IDA) is a disassembler for computer software which generates assembly language source code from machine-executable code. It supports a variety of executable formats for different processors and operating systems. It can also be used as a debugger for Windows PE, Mac OS X Mach-O, and Linux ELF executables. A decompiler plug-in, which generates a high level, C source code-like representation of the analysed program, is available at extra cost.[4][5]
IDA is used widely in software reverse engineering, including for malware analysis[6][7] and software vulnerability research.[8] IDA has been referred to as the "de-facto industry standard disassembler".[9][10][11][12]
History
Ilfak Guilfanov began working on IDA in 1990,[13][14][15][16] and initially distributed it as a shareware application. In 1996, the Belgian company DataRescue took over the development of IDA and began to sell it as a commercial product, under the name IDA Pro.[17][18]
Initial versions of IDA did not have a graphical user interface (GUI), and ran as an extended DOS, OS/2, or Windows console application.[19] In 1999, DataRescue released the first version of IDA Pro with a GUI, IDA Pro 4.0.[20]
In 2005, Guilfanov founded Hex-Rays to pursue the development of the Hex-Rays Decompiler IDA extension.[21][22] In January 2008, Hex-Rays assumed the development and support of DataRescue's IDA Pro.[23][24]
In 2022, Hex-Rays was acquired by Smartfin, a European venture capital and private equity investor.[25][26]
Features
IDA disassembles a compiled program back into an assembly language representation. In addition to performing basic disassembly, IDA also automatically annotates disassembled programs with information about:[27]
- cross-references between code and data in the program
- function locations, function stack frames, and function calling conventions
- reconstructed data types
However, the nature of disassembly precludes total accuracy, and a great deal of human intervention is necessarily required; IDA has interactive functionality to aid in improving the disassembly. A typical IDA user will begin with an automatically generated disassembly listing and then convert sections from code to data and vice versa, rename, annotate, and otherwise add information to the listing, until its functionality becomes clear.
Scripting
"IDC scripts" make it possible to extend the operation of the disassembler. Some helpful scripts are provided, which can serve as the basis for user written scripts. Most frequently scripts are used for extra modification of the generated code. For example, external symbol tables can be loaded thereby using the function names of the original source code.
Users have created plugins that allow other common scripting languages to be used instead of, or in addition to, IDC. IdaRUB[28] supports Ruby and IDAPython[29] adds support for Python. As of version 5.4, IDAPython (dependent on Python 2.5) comes preinstalled with IDA Pro.
Debugging
IDA Pro supports a number of debuggers,[30] including:
- Remote Windows, Linux, and Mac applications (provided by Hex-Rays) allow running an executable in its native environment (presumably using a virtual machine for malware)
- GNU Debugger (gdb) is supported on Linux and OS X, as well as the native Windows debugger
- A Bochs plugin is provided for debugging simple applications (i.e., damaged UPX or mpress compacted executables)
- An Intel PIN-based debugger
- A trace replayer
Versions
The latest full version of IDA Pro is commercial (version 8.2 as of December 2022), while a less capable version, named IDA Free, is available for download free of cost.[31]
Supported systems/processors/compilers
- System hosts
- Windows x86 and ARM
- Linux x86
- Mac OS X x86
- Recognized executable file formats
- COFF and derivatives, including Win32/64/generic PE
- ELF and derivatives (generic)
- Mach-O (Mach)
- NLM (NetWare)
- LC/LE/LX (OS/2 2.x+ and various DOS extenders)
- NE (OS/2 1.x, Win16, and various DOS extenders)
- MZ (MS-DOS)
- OMF and derivatives (generic)
- AIM (generic)
- raw binary, such as a ROM image or a COM file
- Instruction sets
- Intel 80x86 family
- ARM architecture
- Motorola 68k and H8
- Zilog Z80
- MOS 6502
- Intel i860
- DEC Alpha
- Analog Devices ADSP218x
- Angstrem KR1878
- Atmel AVR series
- DEC series PDP11
- Fujitsu F2MC16L/F2MC16LX
- Fujitsu FR 32-bit Family
- Hitachi SH3/SH3B/SH4/SH4B
- Hitachi H8: h8300/h8300a/h8s300/h8500
- Intel 196 series: 80196/80196NP
- Intel 51 series: 8051/80251b/80251s/80930b/80930s
- Intel i960 series
- Intel Itanium (ia64) series
- Java virtual machine
- MIPS: mipsb/mipsl/mipsr/mipsrl/r5900b/r5900l
- Microchip PIC: PIC12Cxx/PIC16Cxx/PIC18Cxx
- MSIL
- Mitsubishi 7700 Family: m7700/m7750
- Mitsubishi m32/m32rx
- Mitsubishi m740
- Mitsubishi m7900
- Motorola DSP 5600x Family: dsp561xx/dsp5663xx/dsp566xx/dsp56k
- Motorola ColdFire
- Motorola HCS12
- NEC 78K0/78K0S
- PA-RISC
- PowerPC
- Xenon PowerPC Family
- SGS-Thomson ST20/ST20c4/ST7
- SPARC Family
- Samsung SAM8
- Siemens C166
- TMS320Cxxx series
- Compiler/libraries (for automatic library function recognition)[32]
See also
- Binary Ninja
- Cheat engine
- Ghidra
- JEB
- Radare2
References
- ↑ Czokow, Geoffrey (2021-05-20). "IDA: celebrating 30 years of binary analysis innovation" (in en). https://hex-rays.com/blog/ida-celebrating-30-years-of-binary-analysis-innovation/.
- ↑ IDA 8.3.230608 (June 8, 2023)
- ↑ Hex-rays Home
- ↑ Eagle, Chris (2011). "Chapter 23: Real-World IDA Plug-ins". The IDA Pro Book : the Unoffical Guide to the World's Most Popular Disassembler. (2nd ed.). San Francisco: No Starch Press. pp. 500–502. ISBN 978-1-59327-395-8. OCLC 830164382. https://www.worldcat.org/oclc/830164382.
- ↑ "Hex-Rays Decompiler". https://hex-rays.com/decompiler/.
- ↑ Staff, S. C. (2017-09-11). "Hex-Rays IDA Pro" (in en). https://www.scmagazine.com/product-test/content/hex-rays-ida-pro.
- ↑ Sikorski, Michael (2012). "Chapter 5. IDA Pro". Practical Malware Analysis : a Hands-On Guide to Dissecting Malicious Software.. Andrew Honig. San Francisco: No Starch Press. ISBN 978-1-59327-430-6. OCLC 830164262. https://www.worldcat.org/oclc/830164262.
- ↑ Shoshitaishvili, Yan; Wang, Ruoyu; Salls, Christopher; Stephens, Nick; Polino, Mario; Dutcher, Andrew; Grosen, John; Feng, Siji et al. (2016-05-22). "SOK: (State of) the Art of War: Offensive Techniques in Binary Analysis". 2016 IEEE Symposium on Security and Privacy (SP). pp. 138–157. doi:10.1109/SP.2016.17. ISBN 978-1-5090-0824-7. https://ieeexplore.ieee.org/document/7546500.
- ↑ Ben Khadra, M. Ammar; Stoffel, Dominik; Kunz, Wolfgang (2016-10-01). "Speculative disassembly of binary code". Proceedings of the International Conference on Compilers, Architectures and Synthesis for Embedded Systems. CASES '16. New York, NY, USA: Association for Computing Machinery. pp. 1–10. doi:10.1145/2968455.2968505. ISBN 978-1-4503-4482-1. https://doi.org/10.1145/2968455.2968505. ""It outperforms IDA Pro, the de-facto industry standard disassembler, in terms of disassembly correctness.""
- ↑ Di Federico, Alessandro; Payer, Mathias; Agosta, Giovanni (2017-02-05). "Rev.ng: A unified binary analysis framework to recover CFGS and function boundaries". Proceedings of the 26th International Conference on Compiler Construction. CC 2017. New York, NY, USA: Association for Computing Machinery. pp. 131–141. doi:10.1145/3033019.3033028. ISBN 978-1-4503-5233-8. https://doi.org/10.1145/3033019.3033028. ""We evaluate our prototype implementation against the de-facto industry standard for static binary analysis, IDA Pro,""
- ↑ Garcia Prado, Carlos; Erickson, Jon (April 10, 2018). "Solving Ad-hoc Problems with Hex-Rays API". https://www.fireeye.com/blog/threat-research/2018/04/solving-ad-hoc-problems-with-hex-rays-api.html. ""IDA Pro is the de facto standard when it comes to binary reverse engineering.""
- ↑ Andriesse, Dennis (2019). "Appendix C: List of Binary Analysis Tools". Practical binary analysis : build your own Linux tools for binary instrumentation, analysis, and disassembly. San Francisco, CA. ISBN 978-1-59327-913-4. OCLC 1050453850. https://www.worldcat.org/oclc/1050453850. ""This [IDA Pro] is the de facto industry-standard recursive disassembler.""
- ↑ Гильфанов, Ильфак (22 May 2003). "IDA Pro - samyj moshhnyj dizassembler v mire" IDA Pro - самый мощный дизассемблер в мире [IDA Pro - the most powerful disassembler in the world] (Interview) (in русский). Interviewed by Доля, Алексей. Компания "Ф-Центр". sec. 2.30. Archived from the original on May 15, 2021. Retrieved 14 March 2023.
Он начался как хобби в далеком 1991 году, просто увлечением для себя и для друзей.
- ↑ "IDA Pro - Часто задаваемые вопросы". http://www.idapro.ru/faq.html#053. "Первые строки для IDA были написаны в декабре 1990."
- ↑ Czokow, Geoffrey (2021-05-20). "IDA: celebrating 30 years of binary analysis innovation" (in en). https://hex-rays.com/blog/ida-celebrating-30-years-of-binary-analysis-innovation/.
- ↑ "Hex Rays - State-of-the-art binary code analysis solutions". https://hex-rays.com/about-us/our-journey/.
- ↑ Guilfanov, Ilfak (in en), CODE BLUE 2014 : Ilfak Guilfanov - Keynote : The story of IDA Pro, https://www.youtube.com/watch?v=hLBlck1lTUs, retrieved 2023-03-16, ""Datarescue converted my hobby project into a commercial program in 1996.""
- ↑ "DataRescue IDA Pro Page". http://www.datarescue.com/ida.htm.
- ↑ "DataRescue IDA Page : download an evaluation version". http://www.datarescue.com/idadown.htm.
- ↑ "DataRescue IDA Pro What's new Page". http://datarescue.com:80/idanew.htm.
- ↑ "Gegevens van de geregistreerde entiteit | KBO Public Search". https://kbopub.economie.fgov.be/kbopub/toonondernemingps.html?ondernemingsnummer=873473914.
- ↑ "Hex-Rays Decompiler". http://www.hex-rays.com/products.shtml.
- ↑ "DataRescue Home Page : home of the IDA Pro Disassembler and of PhotoRescue". http://www.datarescue.com/. ""News 07/01/2008: IDA Pro moves to Hex-Rays.""
- ↑ "Hex-Rays Home Page". http://www.hex-rays.com/index.shtml.
- ↑ "A consortium of investors acquires Hex-Rays – Hex Rays" (in en). https://hex-rays.com/blog/hex-rays-acquisition/.
- ↑ "News Industry | Smartfin led consortium acquires Hex-Rays to accelerate product innovation efforts" (in en-US). 2022-10-20. https://www.helpnetsecurity.com/2022/10/21/hex-rays-smartfin/.
- ↑ Eagle, Chris (2011). "Part II. Basic IDA Usage". The IDA Pro Book : the Unoffical Guide to the World's Most Popular Disassembler. (2nd ed.). San Francisco: No Starch Press. ISBN 978-1-59327-395-8. OCLC 830164382. https://www.worldcat.org/oclc/830164382.
- ↑ https://github.com/spoonm/idarub
- ↑ "Idapython [d-dome.net]". http://d-dome.net/idapython/.
- ↑ Eagle, Chris (2008). The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler. No Starch Press. ISBN 978-1-59327-178-7.
- ↑ IDA Pro Freeware version download
- ↑ "FLIRT Compiler Support". Hex-Rays. http://www.hex-rays.com/idapro/idaflirtcomp.htm.
Further reading
- Eilam, Eldad (2005). Reversing: Secrets of Reverse Engineering. Wiley Publishing. pp. 595. ISBN 0-7645-7481-7.
External links
- "IDA Pro on Internet Archive" (in ru). http://www.idapro.ru/.
- "IDA plug-ins and scripts". http://www.openrce.org.
Original source: https://en.wikipedia.org/wiki/Interactive Disassembler.
Read more |