Finding Inlined Functions in Optimized Binaries

Total Page:16

File Type:pdf, Size:1020Kb

Finding Inlined Functions in Optimized Binaries IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1 Learning to Find Usages of Library Functions in Optimized Binaries Toufique Ahmed, Premkumar Devanbu, and Anand Ashok Sawant Abstract—Much software, whether beneficent or malevolent, is distributed only as binaries, sans source code. Absent source code, understanding binaries’ behavior can be quite challenging, especially when compiled under higher levels of compiler optimization. These optimizations can transform comprehensible, “natural” source constructions into something entirely unrecognizable. Reverse engineering binaries, especially those suspected of being malevolent or guilty of intellectual property theft, are important and time-consuming tasks. There is a great deal of interest in tools to “decompile” binaries back into more natural source code to aid reverse engineering. Decompilation involves several desirable steps, including recreating source-language constructions, variable names, and perhaps even comments. One central step in creating binaries is optimizing function calls, using steps such as inlining. Recovering these (possibly inlined) function calls from optimized binaries is an essential task that most state-of-the-art decompiler tools try to do but do not perform very well. In this paper, we evaluate a supervised learning approach to the problem of recovering optimized function calls. We leverage open-source software and develop an automated labeling scheme to generate a reasonably large dataset of binaries labeled with actual function usages. We augment this large but limited labeled dataset with a pre-training step, which learns the decompiled code statistics from a much larger unlabeled dataset. Thus augmented, our learned labeling model can be combined with an existing decompilation tool, Ghidra, to achieve substantially improved performance in function call recovery, especially at higher levels of optimization. Index Terms—Reverse engineering, Software modeling, Deep learning F 1 INTRODUCTION N their seminal work, Chikofsky and Cross [1], define decompile the binary successfully. I Software Reverse Engineering as “the process of analyzing Two tools are industry standard for reverse engineering: a subject system to (1) identify the system’s components Hexrays IDA Pro [2] and Ghidra [3]. These tools incorporate and their interrelationships and (2) create representations two distinct functionalities: a disassembler (convert binary to of the system in another form or at a higher level of ab- assembly code), and a decompiler (convert assembly code to straction”. Understanding the behavior of software binaries a higher-order representation, similar to C code), and a vari- generated by potentially untrusted parties have many mo- ety of data flow analysis tools. Both tools can handle binaries tivations such binaries may incorporate e.g., stolen intellec- that have been compiled on a variety of architectures (such tual property (such as patented or protected algorithms or as x86/64 or ARM64). data), unauthorized access to system resources, or malicious In the field of security, quite a bit of work has focused behavior of various sorts. The ability to reverse engineer on understanding the behavior of malicious applications binaries would make it more difficult to conceal potential by examining their library API calls [4], [5], [6], [7], [8], bad behavior, and thus act as a deterrent, and this would [9], [10], [11], [12]. The intuition behind this is that calls enhance public confidence in, and overall free exchange of, made to library APIs (such as Windows DLLs) can cap- software technology. ture the important underlying semantics of the malware’s Reverse engineering of an optimized binary is quite chal- attacking behaviour [13]. However, uncovering API calls is arXiv:2103.05221v2 [cs.SE] 17 Sep 2021 lenging, since compilers substantially transform source code particularly hard as the compiler might have mangled the structures to create the binary. This is done primarily to inlined body of the called function together with the code at improve run-time performance; however, some compilers the calling site in complex ways. Both Ghidra and Hexrays support deliberate obfuscation of source code details, to have specially engineered functionality for recovering calls protect IP, or for security reasons. The resulting binary could to library functions . These functions are considered very be stripped of all information such as variable names, code important by the developers of these tools and are explicitly comments, and user-defined types. Binaries compiled using documented and advertised. gcc can be optimized in the interest of run-time perfor- Both solutions use a database of assembly-level signa- mance benefits, (even if compilation per se takes longer). tures for each potentially inlined library call. Assembler Optimizations include function inlining, array vectorization, code recovered from the binary is matched against the and loop unrolling. This dramatically alters the code at the database to identify library function bodies within the bi- assembly level, making it substantially more challenging to nary. The approaches, however, do not work as well with higher optimization levels due to extensive code restructur- • All the authors are with the Department of Computer Science, University ing [14], [15] and context-dependent inlining of the called of California, Davis, CA, 95616. method’s body. Despite both tools making an attempt to find E-mail: ftfahmed, ptdevanbu, [email protected] library function invocations in a static way (see, e.g., [16], Manuscript in submission item 7), the problem is non-trivial and more often than not IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2 undefined4 * component_name_wrap (char * param_1) { static char * component_name_wrap (const char * name) size_t sVar1 ; { undefined4 * __dest; int len = strlen(name) + 30; sVar1 = strlen(param_1); char * wrap = malloc_or_quit(len); __dest = (undefined4 *) malloc_or_quit((long) ((int) sVar1 + 0x1e)); strcpy(wrap, "/mgmt/"); * __dest = 0x6d676d2f ; Funcre recovers strcat(wrap, name); *(undefined2 *) (__dest + 1) = 0x2f74; missing inlined return wrap; *(undefined *) ((long) __dest + 6) = 0; strcpy } strcat ((char *) __dest, param_1); return __dest; } Fig. 1: Finding inline functions in real-world1decompiled version of original C source code these functions are not recovered. This problem is compli- approach that allows us to places labels (with the name of cated by varying compilers, compiler versions, optimization the function) in the binary, at locations where a function has levels, and library versions. been inlined. Our labels resist being removed by optimizing This signature or pattern-oriented approach adopted by compilers; this also minimizes interference with the opti- current tools relies on a pattern database; this database must mizing compilers code generation. This labeling approach be manually maintained to include a pattern (or patterns) for allows us to successfully annotate 9,643 files and 459 open- each possible inlined function. Therefore, we adopt a more source projects, creating a large training dataset. data-driven approach and propose to learn to identify those functions that are most often used in the data. To that end, Our approach uses a pre-training plus fine-tuning we develop our tool, FUNCRE, which finds inlined library scheme [17] currently popular in natural language process- function invocations even in binaries compiled with higher ing. We pre-train using a masked language model (MLM) on optimization levels. With sufficient data, a suitably designed decompiled binaries. This pre-training step helps our model training approach, and a powerful enough model, this ap- learn the statistics of a large corpus of decompiled source proach offers enhanced ability to recover inlined functions. code. These statistics are represented in a low-dimensional As an illustration, in Figure 1, we present a sample of positional embedding. We then fine-tune on the labeled original source code (from GitHub) and its Ghidra output dataset of inlined functions. FUNCRE achieves a precision for compilation with Os. From the decompiled version, of 0.64 and a recall of 0.46. When combined with the results it’s evident that recovering strlen, malloc_or_quit and, of Ghidra (since it uses the output of Ghidra, which might strcat is possible for Ghidra, but the strcpy gets inlined contain some functions recovered), our approach provides with copying of pointers to stack addresses after optimiza- the highest f-score across all optimization levels while also tion. The pattern-database approach used by Ghidra works recovering a larger number of unique functions. Recover- well for the three of the four functions; but Ghidra fails to ing inlined functions (where assembly-level function pro- recover the latter, (strcpy), because the more complex pattern logues & epilogues are absent, the inlined body is changed required is not available in its database. The precision of and shuffled by optimization) is hard even for humans Ghidra is 1.0 for this example, but the recall is lower (0.75). and existing tools; however, a high-capacity neural model Our tool FUNCRE builds on Ghidra, and will only try to (RoBERTa + Transformer) that uses pre-training and fine- recover additional inlined functions beyond what Ghidra tuning can still learn statistical features and associations does, using automatically learned patterns latent within its between inlined functions and the mangled residual clues layered deep-learning architecture.
Recommended publications
  • Software Comprehension Using Open Source Tools: a Study
    International Journal of Computer Sciences and Engineering Open Access Survey Paper Vol.-7, Issue-3, March 2019 E-ISSN: 2347-2693 Software Comprehension Using Open Source Tools: A Study Jyoti Yadav Department of Computer Science, Savitribai Phule Pune University, Maharashtra, India *Corresponding Author: [email protected], Tel.: 9881252910 DOI: https://doi.org/10.26438/ijcse/v7i3.657668 | Available online at: www.ijcseonline.org Accepted: 12/Mar/2019, Published: 31/Mar/2019 Abstract: Software applications developed in recent times are written in lakhs of lines of code and have become increasingly complex in terms of structure, behaviour and functionality. At the same time, development life cycles of such applications reveal a tendency of becoming increasingly shorter, due to factors such as rapid evolution of supporting and enabling technologies. As a consequence, an increasing portion of software development cost shifts from the creation of new artefacts to the adaptation of existing ones. A key component of this activity is the understanding of the design, operation, and behaviour of existing artefacts of the code. For instance, in the software industry, it is estimated that maintenance costs exceed 80% of the total costs of a software product’s lifecycle, and software understanding accounts for as much as half of these maintenance costs. Software Comprehension is a key subtask of software maintenance and evolution phase, which is driven by the need to change software. This paper will help in enhancing the ability of the developers to read and comprehend large pieces of software in an organized manner, even in the absence of adequate documentation by using existing open source tools.
    [Show full text]
  • CMSC 246 Systems Programming Spring 2018 Bryn Mawr College Instructor: Deepak Kumar
    1/23/2018 CMSC 246 Systems Programming Spring 2018 Bryn Mawr College Instructor: Deepak Kumar Input • scanf() is the C library’s counterpart to printf. • Syntax for using scanf() scanf(<format-string>, <variable-reference(s)>) • Example: read an integer value into an int variable data. scanf("%d", &data); //read an integer; store into data • The & is a reference operator. More on that later! 2 1 1/23/2018 Reading Input • Reading a float: scanf("%f", &x); • "%f" tells scanf to look for an input value in float format (the number may contain a decimal point, but doesn’t have to). 3 Standard Input & Output Devices • In Linux the standard I/O devices are, by default, the keyboard for input, and the terminal console for output. • Thus, input and output in C, if not specified, is always from the standard input and output devices. That is, printf() always outputs to the terminal console scanf() always inputs from the keyboard • Later, you will see how these can be reassigned/redirected to other devices. 4 2 1/23/2018 Program: Convert Fahrenheit to Celsius • The celsius.c program prompts the user to enter a Fahrenheit temperature; it then prints the equivalent Celsius temperature. • Sample program output: Enter Fahrenheit temperature: 212 Celsius equivalent: 100.0 • The program will allow temperatures that aren’t integers. 5 Program: Convert Fahrenheit to Celsius ctof.c #include <stdio.h> int main(void) { float f, c; printf("Enter Fahrenheit temperature: "); scanf("%f", &f); c = (f – 32) * 5.0/9.0; printf("Celsius equivalent: %.1f\n", c); return
    [Show full text]
  • The C Programming Language
    The C programming Language The C programming Language By Brian W. Kernighan and Dennis M. Ritchie. Published by Prentice-Hall in 1988 ISBN 0-13-110362-8 (paperback) ISBN 0-13-110370-9 Contents ● Preface ● Preface to the first edition ● Introduction 1. Chapter 1: A Tutorial Introduction 1. Getting Started 2. Variables and Arithmetic Expressions 3. The for statement 4. Symbolic Constants 5. Character Input and Output 1. File Copying 2. Character Counting 3. Line Counting 4. Word Counting 6. Arrays 7. Functions 8. Arguments - Call by Value 9. Character Arrays 10. External Variables and Scope 2. Chapter 2: Types, Operators and Expressions 1. Variable Names 2. Data Types and Sizes 3. Constants 4. Declarations http://freebooks.by.ru/view/CProgrammingLanguage/kandr.html (1 of 5) [5/15/2002 10:12:59 PM] The C programming Language 5. Arithmetic Operators 6. Relational and Logical Operators 7. Type Conversions 8. Increment and Decrement Operators 9. Bitwise Operators 10. Assignment Operators and Expressions 11. Conditional Expressions 12. Precedence and Order of Evaluation 3. Chapter 3: Control Flow 1. Statements and Blocks 2. If-Else 3. Else-If 4. Switch 5. Loops - While and For 6. Loops - Do-While 7. Break and Continue 8. Goto and labels 4. Chapter 4: Functions and Program Structure 1. Basics of Functions 2. Functions Returning Non-integers 3. External Variables 4. Scope Rules 5. Header Files 6. Static Variables 7. Register Variables 8. Block Structure 9. Initialization 10. Recursion 11. The C Preprocessor 1. File Inclusion 2. Macro Substitution 3. Conditional Inclusion 5. Chapter 5: Pointers and Arrays 1.
    [Show full text]
  • Fundamentals of C Structure of a C Program
    Fundamentals of C Structure of a C Program 1 Our First Simple Program Comments - Different Modes 2 Comments - Rules Preprocessor Directives Preprocessor directives start with # e.g. #include copies a file into the source code before compilation 2 forms…..we will usually see the first #include <systemFilename> #include “undefinedFilename” Within “ ” : personal file in your own directory 3 We will almost always use #include <stdio.h> • stdio.h is the standard input/output header • Contains code required for I/O (Input/Output) •.hfiles are header files Includes header ; The .obj part on Linking NO code is generally included except on linking • Header files contain definitions The function : main() ALL Programs must have a main() function. Later we will have add other functions. Different Formats: main( ) int main (void ) ***The book likes this void main(void) int main( ) 4 main( ) , void main(void) End with return; ************************** int main (void ) , int main( ) End with return 0; Back To Our First Program 5 Variables A Variable is a block of memory that stores data. A variable has a particular “Type”, i.e. it stores a particular kind of data A variable is named with an appropriate Identifier (or Name) Suppose we have a variable declared as follows: int number_of_days This reserves a block of memory which holds an integer 6 Schematic view: number_of_days 365 In the course of the program we might want to change the value in the variable. So that later we might want: number_of_days 7361 • The “actual” view of memory: 4 bytes number_of_days 01100000 11001010 10010100 00100111 So a variable takes a fixed number of bytes in memory 7 Rules for Naming Variables 1.
    [Show full text]
  • Lesson 01 Programming with C
    Lesson 01 Programming with C Pijushkanti Panigrahi What is C ? • The C is a programming Language, developed by Dennis Ritchie for creating system applications that directly interact with the hardware devices such as drivers, kernels, etc. • C programming is considered as the base for other programming languages, that is why it is known as mother language. • C is famous for its Compactness. • C language is case sensitive. 2 Features It can be defined by the following ways: Mother language System programming language Procedure-oriented programming language Structured programming language Mid-level programming language 3 1) C as a mother language ? • C language is considered as the mother language of all the modern programming languages because most of the compilers, JVMs, Kernels, etc. are written in C language , and most of the programming languages follow C syntax, for example, C++, Java, C#, etc. • It provides the core concepts like the array , strings , functions , file handling , etc . that are being used in many languages like C++ , Java , C# , etc. 4 2) C as a system programming language • A system programming language is used to create system software. • C language is a system programming language because it can be used to do low-level programming (for example driver and kernel) . • It is generally used to create hardware devices, OS, drivers, kernels, etc. For example, Linux kernel is written in C. 5 3) C as a procedural language • A procedure is known as a function, method, routine, subroutine, etc. A procedural language specifies a series of steps for the program to solve the problem.
    [Show full text]
  • Comp.Lang.C Frequently Asked Questions
    comp.lang.c Frequently Asked Questions comp.lang.c Frequently Asked Questions This collection of hypertext pages is Copyright 1995 by Steve Summit. Content from the book ``C Programming FAQs: Frequently Asked Questions'' (Addison-Wesley, 1995, ISBN 0-201-84519-9) is made available here by permission of the author and the publisher as a service to the community. It is intended to complement the use of the published text and is protected by international copyright laws. The content is made available here and may be accessed freely for personal use but may not be published or retransmitted without written permission. This page is the top of an HTML version of the Usenet comp.lang.c Frequently Asked Questions (FAQ) list. An FAQ list is a collection of questions commonly asked on Usenet, together with presumably definitive answers, provided in an attempt to keep repeated questions on the newsgroup down to a low background drone so that discussion can move on to more interesting matters. Since they distill knowledge gleaned from many sources and answer questions which are demonstrably Frequent, FAQ lists serve as useful references outside of their originating Usenet newsgroups. This list is, I dare to claim, no exception, and the HTML version you're looking at now, as well as other versions referenced just below, are intended to be useful to C programmers everywhere. Several other versions of this FAQ list are available, including a book-length version published by Addison-Wesley. (The book, though longer, also has a few more errors; I've prepared an errata list.) See also question 20.40.
    [Show full text]
  • Second Edition
    SECOND EDITION ~..... .. ... ··-- - -··· · -::.: -· ..- THE PRENTICE HALL SOFTWARE SERIES 001 ServiceNow's Exhibit No. 1004 Ubnry of Colllftll CataloJinl-in-PubUcation Data Kernighan, Brian W. The C programming language. I ncludes i ndex . 1. C (Computer program language) I • .Ritchie, Dennis M. II. Title. QA76.73.C15K47 1988 005 . 13'3 88-5934 ISBN 0-13-110370-9 ISBN 0-13-110362-8 (pbk.) Copyriabt o 1988, 1978 by BeU Telephone Laboratories, Incorporated. C PubJilhcd by Prentice Hall P T R Pronti~·Halt. Inc. Upper Saddle River, NJ 07458 All riahts reserved. No part of this publiaation may be reproduced, stored in a retrieval system. or transmitted, in any form or by any means, electronic, mechanical, photocopy· ina, record ina. or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Publisbcd simultafteOUIIy in Canada. UNIX is a rqistered trademark of AT&: T. This boot was typeset (pic: tbll eqn I troff ...) in Times Roman and Courier by the authors, usina an AutoJoaic APS-S phototypesetter and a DEC VAX 8S.SO runniq tbe 9th Edition of the UNIX• operatina system. Prentice Hall Software Series Brian Kernighan, Advisor ISBN 0-13-110362-8 Text printed in the United States on recycled paper at Courier in Westford, Massachusetts. Fifty-Second Printing, February 2014 ISBN o-l3-1.1D3b2-a {PBK> ISBN 0-13-110370-, Prentice-Hall International (UK) Limited, London Prentice-Hall of Australia Pty. Limited, Sydney Prentice-Hall of Canada, Inc., Toronto Prentice-Hall Hispanoamericana, S. A., Mexico Prentice-Hall ofindia Private Limited, New Delhi Prentice-Hall of Japan, Inc., Tokyo Prentice-Hall Asia Pte.
    [Show full text]
  • Automatic Detection of Security Vulnerabilities in Software Applications Using Static Analysis” Under the Guidance of Dr
    INSTITUTE FOR AUTOMATIC DETECTION OF DEVELOPMENT SECURITY VULNERABILITIES IN OF RESEARCH IN BANKING SOFTWARE APPLICATIONS USING STATIC ANALYSIS TECHNOLOGY Avinash Uttav Guide : Dr. V.Radha Sophomore B.Tech. Computer Science and Engineering Indian Institute Of Technology Guwahati CERTIFICATE This is to certify that Mr. Avinash Uttav, pursuing B.Tech course at Indian Institute of Technology, Guwahati with Computer Science and Engineering as a major subject has undertaken a project as an intern at the Institute for Development and Research in Banking Technology (IDRBT), Hyderabad from May 7th to July 9th , 2012. He was assigned the project “Automatic Detection of Security Vulnerabilities in Software Applications Using Static Analysis” under the guidance of Dr. V.Radha, Assistant Professor of IDRBT. During the course of the project he has undertaken a study of all Security Vulnerabilities prevailing, CODAN Framework in Eclipse for Building Checkers. In this project assigned to Mr. Avinash Uttav he has done excellent work. We wish him all the best in all his endeavors. Dr. V.Radha (Project Guide) Assistant Professor IDRBT, Hyderabad 2 ACKNOWLEDGEMENT I would like to express my sincere gratitude to the Institute for Development and Research in Banking Technology (IDRBT) and particularly Dr. V.RADHA,(Assistant Professor) who was my guide in this project. This opportunity of learning the security vulnerabilities which many of the good programmers don’t know about and the application of the static analysis using CODAN in Eclipse was a boon to me as one rarely gets such exposure. I would not hesitate to add that this short stint in IDRBT has added a different facet to my life as this is a unique organization being a combination of academics, research, technology, communication services, crucial applications, etc., and at the same time performing roles as an arm of regulation, spread of technology, facilitator for implementing technology in banking and non-banking systems, playing a role of an NGO (without being one) and many more varied activities.
    [Show full text]
  • Using the GNU Compiler Collection
    Using the GNU Compiler Collection For gcc version 4.2.4 Richard M. Stallman and the GCC Developer Community Published by: GNU Press Website: www.gnupress.org a division of the General: [email protected] Free Software Foundation Orders: [email protected] 51 Franklin Street, Fifth Floor Tel 617-542-5942 Boston, MA 02110-1301 USA Fax 617-542-2652 Last printed October 2003 for GCC 3.3.1. Printed copies are available for $45 each. Copyright c 1988, 1989, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with the Invariant Sections being “GNU General Public License” and “Funding Free Software”, the Front-Cover texts being (a) (see below), and with the Back-Cover Texts being (b) (see below). A copy of the license is included in the section entitled “GNU Free Documentation License”. (a) The FSF’s Front-Cover Text is: A GNU Manual (b) The FSF’s Back-Cover Text is: You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development. i Short Contents Introduction ............................................. 1 1 Programming Languages Supported by GCC ............... 3 2 Language Standards Supported by GCC .................. 5 3 GCC Command Options ............................... 7 4 C Implementation-defined behavior ..................... 215 5 Extensions to the C Language Family ................... 223 6 Extensions to the C++ Language .....................
    [Show full text]
  • Unit 3 Introduction to Programming in C
    Programming Unit 3. Basic C Haga clic para modificar el estilo de texto del patrón Unit 3. Basic C UNIT 3 INTRODUCTION TO PROGRAMMING IN C Programming Grade in Industrial Technology Engineering 2017-18 Paula de Toledo. Maria Paz Sesmero. David Griol Unit 3. Basic C Haga clic para modificar el estilo de texto del patrón Contents • Introduction to the C programming language • Basic structure of a program • Variables and constants • Simple data types • Strings and structured data types • Expressions and instructions • Operators • Input/output: printf and scanf 2 Unit 3. Basic C 3.1.Haga Introducción clic para modificar al Lenguaje el estilo C de texto del patrón Algorithm, Program and programming language • Program • Set of orders (instructions) written in a given programming language that are given to a computer to solve a problem implementing an algorithm Algorithm Program in C Ask for number 1 #include <stdio.h> #include <stdlib.h> Get number 1 int main(void) { Ask for number 2 float num1,num2,resul; printf(“Insert first number: \n"); Get number 2 scanf("%f",&num1); printf(“Insert second number.: \n"); Result number 1 * number 2 scanf("%f",&num2); resul=num1*num2; Show result printf(“result of the sum is %f \n",resul); return 0; } C language 5 Unit 3. Basic C 1.Haga Introduction clic para modificar C el estilo de texto del patrón History of C • C is closely related to the development of the UNIX operating system at AT&T Bell Labs • 1968-1971 • First versions of UNIX • Unix users write programs in assembly language • Towards a more appropriate programming language: B, NB (1973) • 1971-1972 • C is created (K.
    [Show full text]
  • Foundation Services
    VisiQuest MANUALS Programming Services Volume I Foundation Services AccuSoft Corp. www.accusoft.com Program Services Volume I Chapter 0 Preface Copyright (c) AccuSoft Corporation, 2004. All rights reserved. Chapter 0 - Preface A. About This Book This volume is intended for the VisiQuest Toolbox programmer who wants to utilize the library routines avail- able in VisiQuest Foundation Services to develop new programs. It is also intended for those who are using VisiQuest as a software integration system, and wish to modify existing code such that it takes full advantage of the capabilities provided by VisiQuest. Foundation Services is the collective name for the six libraries available in the bootstrap toolbox. The applica- tion program developed using Foundation Services will automatically capitalize on the portability derived from the operation system abstraction provided by Foundation Services. Similarly, an application program using Foundation Services will transparently obtain the capability to support the variety of data transport mecha- nisms handled by Foundation Services. In addition, Foundation Services offers a variety of mathematical functions, a symbolic expression parser, and a wide variety of commonly used functions and utilities. Foundation Services is one of three major categories into which VisiQuest libraries are divided. Data Services emcompasses the libraries in the dataser v toolbox; these libraries consist of routines for accessing and manip- ulating data. GUI & Visualization Services, consisting of libraries in the design toolbox, provides routines for visualizing data in the form of images and graphics. Together, Foundation Services, Data Services, and GUI & Visualization Services contain all the libraries that are distributed with VisiQuest. Program Services refers to all three services as a group.
    [Show full text]
  • Scanf( ) Format String!
    CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 11, SPRING 2013 TOPICS TODAY • C Input/Output • Characters & Strings in C • Structures in C • Project 4 C INPUT/OUTPUT stdin, stdout, stderr C opens three input/output devices automatically: stdin The standard input device, usually your keyboard stdout The standard output device, usually your monitor stderr The standard error device, usually your monitor Some C library I/O functions automatically use these devices Adapted from Dennis Frey CMSC 313 Fall 2011 Formatted Console Output! • printf( ) outputs formatted text to stdout ! !printf( format, arg1, arg2, … ); !! • Example:! int n = 3 ;! !printf (“Value = %d\n”, n) ;! • format is a string containing! • conversion specifications! • literals to be printed! Adapted from Dennis Frey CMSC 313 Fall 2011 printf( ) conversions Conversions specifications begin with % and end with a conversion character. Between the % and the conversion character MAY be, in order A minus sign specifying left-justification The minimum field width A period separating the field width and precision The precision that specifies Maximum characters for a string Number of digits after the decimal for a floating point Minimum number of digits for an integer An h for short or an l (letter ell) for long man printf for more documentation. Adapted from Dennis Frey CMSC 313 Fall 2011 Common printf( ) Conversions %d print integer as a decimal number (base 10) %u! print integer as unsigned number %s print string %f print double as a floating point number %x!
    [Show full text]