Memory access tracing is aprogram analysis technique with many different applications, ranging from architectural simulation to (on-line) data placement optimization and security enforcement. In this article we propose a memory access tracing approach based on static x86 binary instrumentation. Unlike non-selective schemes, whichinstrument all the memory access instructions, our proposal selectively instruments a subset of those instructions that are the most (or fully) representative of the actual memory access pattern. The selection of the memory access instructions to be instrumented is based on a new method, which clusters instructions on the basis of their compile/link-time observable address expressions and selects representatives of ...
Binary manipulation techniques are increasing in popularity. They support program transformations ta...
Complete comprehension of loop codes is desirable for a variety of program optimizations. Compilers ...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
Memory access tracing is aprogram analysis technique with many different applications, ranging from ...
International audienceThis paper deals with the binary analysis of executable programs, with the goa...
Tools for acquiring dynamic memory address information for large scale applications are important fo...
Memory tracing (executing additional code for every memory access of a program) is a powerful techni...
With the increasing deployment of heterogeneous memory architectures, the efficient execution of a w...
Event tracing of applications under dynamic execution is crucial for performance modeling, optimizat...
Tools for memory access detection are widely used, playing an important role especially in real-time...
Tools for memory access detection are widely used, playing an important role especially in real-time...
This paper concerns static analysis algorithms for analyzing x86 executables. The aim of the work is...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
Abstract. Memory traces record the addresses touched by a program during its execution, enabling man...
Abstract—Memory trace analysis is an important technology for architecture research, system software...
Binary manipulation techniques are increasing in popularity. They support program transformations ta...
Complete comprehension of loop codes is desirable for a variety of program optimizations. Compilers ...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
Memory access tracing is aprogram analysis technique with many different applications, ranging from ...
International audienceThis paper deals with the binary analysis of executable programs, with the goa...
Tools for acquiring dynamic memory address information for large scale applications are important fo...
Memory tracing (executing additional code for every memory access of a program) is a powerful techni...
With the increasing deployment of heterogeneous memory architectures, the efficient execution of a w...
Event tracing of applications under dynamic execution is crucial for performance modeling, optimizat...
Tools for memory access detection are widely used, playing an important role especially in real-time...
Tools for memory access detection are widely used, playing an important role especially in real-time...
This paper concerns static analysis algorithms for analyzing x86 executables. The aim of the work is...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
Abstract. Memory traces record the addresses touched by a program during its execution, enabling man...
Abstract—Memory trace analysis is an important technology for architecture research, system software...
Binary manipulation techniques are increasing in popularity. They support program transformations ta...
Complete comprehension of loop codes is desirable for a variety of program optimizations. Compilers ...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...