Shadow memory is used by dynamic program analysis tools to store metadata for tracking properties of application memory. The efficiency of mapping between application memory and shadow memory has substantial impact on the overall performance of such analysis tools. However, traditional memory mapping schemes that work well on 32-bit architectures cannot easily port to 64-bit architectures due to the much larger 64-bit address space. This paper presents EMS64, an efficient memory shadowing scheme for 64-bit architectures. By taking advantage of application reference locality and unused regions in the 64-bit address space, EMS64 provides a fast and flexible memory mapping scheme without relying on any underlying platform features or requir...
Operating systems employ virtual memory mechanism to provide large address pace for programs. The ef...
Tools for acquiring dynamic memory address information for large scale applications are important fo...
Virtual memory is a classic computer science abstraction and is ubiquitous in all scales of computin...
Shadow memory is used by dynamic program analysis tools to store metadata for tracking properties of...
Shadow value tools use metadata to track properties of application data at the granularity of indivi...
Several existing dynamic binary analysis tools use shadow mem-ory—they shadow, in software, every by...
Despite of continuous efforts on reducing virtualization overhead, memory virtualization overhead re...
With the evolvement of hardware, 64-bit Central Processing Units (CPUs) and 64-bit Operating Systems...
With the evolvement of hardware, 64-bit Central Processing Units (CPUs) and 64-bit Operating Systems...
Memory tracing (executing additional code for every memory access of a program) is a powerful techni...
Conference of 2017 ACM SIGPLAN International Symposium on Memory Management, ISMM 2017 ; Conference ...
The overhead of memory virtualization remains nontrivial. The traditional shadow paging (TSP) resort...
Abstract. Alias analysis, traditionally performed statically, is unsuited for a dynamic binary trans...
The performance contributions of SDRAM address mapping techniques in the main memory of an embedded ...
Control flow defenses against ROP either use strict, expen-sive, but strong protection against redir...
Operating systems employ virtual memory mechanism to provide large address pace for programs. The ef...
Tools for acquiring dynamic memory address information for large scale applications are important fo...
Virtual memory is a classic computer science abstraction and is ubiquitous in all scales of computin...
Shadow memory is used by dynamic program analysis tools to store metadata for tracking properties of...
Shadow value tools use metadata to track properties of application data at the granularity of indivi...
Several existing dynamic binary analysis tools use shadow mem-ory—they shadow, in software, every by...
Despite of continuous efforts on reducing virtualization overhead, memory virtualization overhead re...
With the evolvement of hardware, 64-bit Central Processing Units (CPUs) and 64-bit Operating Systems...
With the evolvement of hardware, 64-bit Central Processing Units (CPUs) and 64-bit Operating Systems...
Memory tracing (executing additional code for every memory access of a program) is a powerful techni...
Conference of 2017 ACM SIGPLAN International Symposium on Memory Management, ISMM 2017 ; Conference ...
The overhead of memory virtualization remains nontrivial. The traditional shadow paging (TSP) resort...
Abstract. Alias analysis, traditionally performed statically, is unsuited for a dynamic binary trans...
The performance contributions of SDRAM address mapping techniques in the main memory of an embedded ...
Control flow defenses against ROP either use strict, expen-sive, but strong protection against redir...
Operating systems employ virtual memory mechanism to provide large address pace for programs. The ef...
Tools for acquiring dynamic memory address information for large scale applications are important fo...
Virtual memory is a classic computer science abstraction and is ubiquitous in all scales of computin...