1. This paper presents a method to recover object-oriented features from stripped C++ binaries.
2. The information obtained can be used for reengineering legacy software and understanding the architecture of software systems.
3. The method is able to identify 80% of virtual functions, 100% of classes, 78% of member functions, and 55% of member variables from stripped binaries compared to the total number in non-stripped binaries.
The article is generally reliable and trustworthy as it provides detailed information on the method used to recover object-oriented features from stripped C++ binaries. It also provides evidence for its claims by comparing the results with those obtained from non-stripped binaries. However, there are some potential biases that should be noted. For example, the article does not explore any counterarguments or alternative methods that could be used for this purpose. Additionally, it does not provide any information on possible risks associated with using this method or how it could be improved upon in the future. Furthermore, there is no mention of any other applications or uses for this technique beyond reverse engineering and cyber security applications which may limit its usefulness in other areas. Finally, there is no discussion on how this technique could be applied to other programming languages such as Java or Python which would broaden its scope and applicability even further.