Shadow value tools use metadata to track properties of application data at the granularity of individual machine instructions. These tools provide effective means of monitoring and analyzing the runtime behavior of applications. However, the high runtime overhead stemming from fine-grained monitoring often limits the use of such tools. Furthermore, 64-bit architectures pose a new challenge to the building of efficient memory shadowing tools. Current tools are not able to efficiently monitor the full 64-bit address space due to limitations in their shadow metadata translation. This paper presents an efficient and scalable memory shadowing framework called Umbra. Employing a novel translation scheme, Umbra supports efficient mapping from a...
International audienceOne classical approach to ensuring memory safety of C programs is based on sto...
Abstract. Alias analysis, traditionally performed statically, is unsuited for a dynamic binary trans...
An important issue in modern cache designs is bridging the gap between wire and device delays. This ...
Shadow memory is used by dynamic program analysis tools to store metadata for tracking properties of...
Shadow memory is used by dynamic program analysis tools to store metadata for tracking properties of...
Several existing dynamic binary analysis tools use shadow mem-ory—they shadow, in software, every by...
Conference of 2017 ACM SIGPLAN International Symposium on Memory Management, ISMM 2017 ; Conference ...
Despite of continuous efforts on reducing virtualization overhead, memory virtualization overhead re...
In profiling, a tradeoff exists between information and overhead. For example, hardware-sampling pro...
Dynamic data flow tracking (DFT) is a technique broadly used in a variety of security applications t...
Dynamic data flow tracking (DFT) is a technique broadly used in a variety of security applications t...
Memory tracing (executing additional code for every memory access of a program) is a powerful techni...
This thesis describes the implementation of a shadowing system able to produce hard shadows. Shadow ...
Conference of 30th Annual ACM Symposium on Applied Computing, SAC 2015 ; Conference Date: 13 April 2...
The overhead of memory virtualization remains nontrivial. The traditional shadow paging (TSP) resort...
International audienceOne classical approach to ensuring memory safety of C programs is based on sto...
Abstract. Alias analysis, traditionally performed statically, is unsuited for a dynamic binary trans...
An important issue in modern cache designs is bridging the gap between wire and device delays. This ...
Shadow memory is used by dynamic program analysis tools to store metadata for tracking properties of...
Shadow memory is used by dynamic program analysis tools to store metadata for tracking properties of...
Several existing dynamic binary analysis tools use shadow mem-ory—they shadow, in software, every by...
Conference of 2017 ACM SIGPLAN International Symposium on Memory Management, ISMM 2017 ; Conference ...
Despite of continuous efforts on reducing virtualization overhead, memory virtualization overhead re...
In profiling, a tradeoff exists between information and overhead. For example, hardware-sampling pro...
Dynamic data flow tracking (DFT) is a technique broadly used in a variety of security applications t...
Dynamic data flow tracking (DFT) is a technique broadly used in a variety of security applications t...
Memory tracing (executing additional code for every memory access of a program) is a powerful techni...
This thesis describes the implementation of a shadowing system able to produce hard shadows. Shadow ...
Conference of 30th Annual ACM Symposium on Applied Computing, SAC 2015 ; Conference Date: 13 April 2...
The overhead of memory virtualization remains nontrivial. The traditional shadow paging (TSP) resort...
International audienceOne classical approach to ensuring memory safety of C programs is based on sto...
Abstract. Alias analysis, traditionally performed statically, is unsuited for a dynamic binary trans...
An important issue in modern cache designs is bridging the gap between wire and device delays. This ...