This is the philosophy we do our best to follow when developing our products — in doing so, we believe we will create software that brings you the reliability, convenience and ease of use you require.
Nothing beats the Human brain
Because we know that one second of insight still beats hundred years of processing time, the IDA Disassembler offers as much interactivity as is possible. Virtually anything in the disassembly can be modified, manipulated, rearranged or redefined.
Static Disassembly is limited
Mere static disassembly does not tell the whole story. Encrypted or obfuscated code is frequently present in today’s hostile code; exact distinction between code and data is an art rather than a science. The IDA Disassembler’s interactivity is complemented by an internal scripting language, a Windows application/kernel debugger, a Linux application debugger, a 80×86 Mac OS X application debugger (both 32 and 64 bits are supported) and much much more…
Innovation must be cherished
As an additional incentive to create new plugins for our products, we hold an annual plugin contest. The creators of useful public plugins can win a cash prize. We also publish the names on our Hall of Fame pages.
Time is of the essence
Gone are the days when an assembly language wizard would glance at a few op-codes and grasp the purpose of a program. Today’s viruses and worms are often written in high level language. Thanks to our unique FLIRT technology and our advanced stack tracking capabilities, IDA Disassembler works as close as is possible to the original source code.
You know best
We are the disassembler and debugger specialists but you are the ones producing the real work. You know what you need better than we do. That is why the IDA SDK allows you to extend and tailor IDA to your specific needs.
Security is of high priority for us
We want our users to be safe while using our tools. This is why in addition to in-house testing, code reviews, and secure coding practices we introduced a bug bounty program. Reporters of critical bugs in our software can win a cash bounty. This way vulnerabilities in our software are reported directly to us. Naturally, we react immediately and issue a hot fix as soon as possible.