Decompiling Java Bytecode: Problems, Traps and Pitfalls
Java virtual machines execute Java bytecode instructions. Since this bytecode is a higher level representation than traditional object code, it is possible to decompile it back to Java source. Many such decompilers have been developed and the conventional wisdom is that decompiling Java bytecode is relatively simple. This may be true when decompiling bytecode produced directly from a specific compiler, most often Sun’s javac compiler. In this case it is really a matter of inverting a known compilation strategy. However, there are many problems, traps and pitfalls when decompiling arbitrary verifiable Java bytecode. Such bytecode could be produced by other Java compilers, Java bytecode optimizers or Java bytecode obfuscators. Java bytecode can also be produced by compilers for other languages, including Haskell, Eiffel, ML, Ada and Fortran. These compilers often use very different code generation strategies from javac.
This paper outlines the problems and solutions we have found in our development of Dava, a decompiler for arbitrary Java bytecode. We first outline the problems in assigning types to variables and literals, and the problems due to expression evaluation on the Java stack. Then, we look at finding structured control flow with a particular emphasis on issues related to Java exceptions and synchronized blocks. Throughout the paper we provide small examples which are not properly decompiled by commonly used decompilers.
- Ammarguellat, Z. (1992) A control-flow normalization algorithm and its complexity. IEEE Transactions on Software Engineering 18: pp. 237-250 CrossRef
- B. S. Baker. An algorithm for structuring flowgraphs. Journal of the Association for Computing Machinery, pages 98–120, January 1977.
- C. Cifuentes. Reverse Compilation Techniques. PhD thesis, Queensland University of Technology, July 1994.
- A. M. Erosa and L. J. Hendren. Taming control flow: A structured approach to eliminating goto statements. In Proceedings of the 1994 International Conference on Computer Languages, pages 229–240, May 1994.
- Gagnon, E. M., Hendren, L. J., Marceau, G. (2000) Efficient inference of static types for Java bytecode. Static Analysis Symposium 2000. Springer, Berlin Heidelberg, pp. 199-219
- Jad-the fast JAva Decompiler. http://www.geocities.com/SiliconValley/-Bridge/8617/jad.html.
- T. Knoblock and J. Rehof. Type elaboration and subtype completion for java bytecode. In Proceedings 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages., 2000.
- J. Miecznikowski and L. Hendren. Decompiling Java using staged encapsulation. In Proceedings of the Working Conference on Reverse Engineering, pages 368–374, October 2001.
- T. A. Proebsting and S. A. Watterson. Krakatoa: Decompilation in Java (Does bytecode reveal source?). In 3rd USENIX Conference on Object-Oriented Technologies and Systems (COOTS’97), pages 185–197, June 1997.
- Ramshaw, L. (1988) Eliminating go to’s while preserving program structure. Journal of the Association for Computing Machinery 35: pp. 893-920
- Soot-a Java Optimization Framework. http://www.sable.mcgill.ca/soot/.
- Vallée-Rai, R., Gagnon, E., Hendren, L., Lam, P., Pominville, P., Sundaresan, V. Optimizing Java bytecode using the Soot framework: Is it feasible?. In: Watt, D. A. eds. (2000) Compiler Construction, 9th International Conference. Springer, Berlin, Germany, pp. 18-34 CrossRef
- WingDis-A Java Decompiler. http://www.wingsoft.com/wingdis.html.
- Decompiling Java Bytecode: Problems, Traps and Pitfalls
- Book Title
- Compiler Construction
- Book Subtitle
- 11th International Conference, CC 2002 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2002 Grenoble, France, April 8–12, 2002 Proceedings
- pp 111-127
- Print ISBN
- Online ISBN
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- Series ISSN
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Industry Sectors
- eBook Packages
To view the rest of this content please follow the download PDF link above.