Hacker News new | past | comments | ask | show | jobs | submit login

Well given a set of known, used optimization techniques the backward operation would be possible to try. If it matches the target binary, would be one step closer to something considered source reconstruction.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: