Memory access tracing is a program analysis technique with many different applications, ranging from architectural simulation to (on-line) data placement optimization and security enforcement. In this article we propose a memory access tracing approach based on static x86 binary instrumentation. Unlike non-selective schemes, which instrument all the memory access instructions, our proposal selectively instruments a subset of those instructions that are the most (or fully) representative of the actual memory access pattern. The selection of the memory access instructions to be instrumented is based on a new method, which clusters instructions on the basis of their compile/link-time observable address expressions and selects representatives o...
Abstract—Memory trace analysis is an important technology for architecture research, system software...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
Complete comprehension of loop codes is desirable for a variety of program optimizations. Compilers ...
Memory access tracing is aprogram analysis technique with many different applications, ranging from ...
International audienceThis paper deals with the binary analysis of executable programs, with the goa...
Memory tracing (executing additional code for every memory access of a program) is a powerful techni...
Tools for acquiring dynamic memory address information for large scale applications are important fo...
With the increasing deployment of heterogeneous memory architectures, the efficient execution of a w...
Event tracing of applications under dynamic execution is crucial for performance modeling, optimizat...
This paper concerns static analysis algorithms for analyzing x86 executables. The aim of the work is...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
Abstract. Memory traces record the addresses touched by a program during its execution, enabling man...
Tools for memory access detection are widely used, playing an important role especially in real-time...
Binary manipulation techniques are increasing in popularity. They support program transformations ta...
Tools for memory access detection are widely used, playing an important role especially in real-time...
Abstract—Memory trace analysis is an important technology for architecture research, system software...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
Complete comprehension of loop codes is desirable for a variety of program optimizations. Compilers ...
Memory access tracing is aprogram analysis technique with many different applications, ranging from ...
International audienceThis paper deals with the binary analysis of executable programs, with the goa...
Memory tracing (executing additional code for every memory access of a program) is a powerful techni...
Tools for acquiring dynamic memory address information for large scale applications are important fo...
With the increasing deployment of heterogeneous memory architectures, the efficient execution of a w...
Event tracing of applications under dynamic execution is crucial for performance modeling, optimizat...
This paper concerns static analysis algorithms for analyzing x86 executables. The aim of the work is...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
Abstract. Memory traces record the addresses touched by a program during its execution, enabling man...
Tools for memory access detection are widely used, playing an important role especially in real-time...
Binary manipulation techniques are increasing in popularity. They support program transformations ta...
Tools for memory access detection are widely used, playing an important role especially in real-time...
Abstract—Memory trace analysis is an important technology for architecture research, system software...
Abstract. This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of t...
Complete comprehension of loop codes is desirable for a variety of program optimizations. Compilers ...