From hack to elaborate technique—a survey on binary rewriting

M Wenzl, G Merzdovnik, J Ullrich… - ACM Computing Surveys …, 2019 - dl.acm.org
Binary rewriting is changing the semantics of a program without having the source code at
hand. It is used for diverse purposes, such as emulation (eg, QEMU), optimization (eg …

[图书][B] Virtual machines: versatile platforms for systems and processes

J Smith, R Nair - 2005 - books.google.com
Virtual Machine technology applies the concept of virtualization to an entire machine,
circumventing real machine compatibility constraints and hardware resource constraints to …

Detours: Binary interception of Win32 functions

D Brubacher - Windows NT 3rd symposium (windows NT 3rd …, 1999 - usenix.org
Innovative systems research hinges on the ability to easily instrument and extend existing
operating system and application functionality. With access to appropriate source code, it is …

[PDF][PDF] Efficient, transparent, and comprehensive runtime code manipulation

D Bruening, S Amarasinghe - 2004 - burningcutlery.com
This thesis addresses the challenges of building a software system for general-purpose
runtime code manipulation. Modern applications, with dynamically-loaded modules and …

Dynamic Instrumentation of Production Systems.

B Cantrill, MW Shapiro, AH Leventhal - USENIX Annual Technical …, 2004 - usenix.org
This paper presents DTrace, a new facility for dynamic instrumentation of production
systems. DTrace features the ability to dynamically instrument both user-level and kernel …

On the scale and performance of cooperative web proxy caching

A Wolman, M Voelker, N Sharma, N Cardwell… - Proceedings of the …, 1999 - dl.acm.org
While algorithms for cooperative proxy caching have been widely studied, little is
understood about cooperative-caching performance in the large-scale World Wide Web …

RecPlay: A fully integrated practical record/replay system

M Ronsse, K De Bosschere - ACM Transactions on Computer Systems …, 1999 - dl.acm.org
This article presents a practical solution for the cyclic debugging of nondeterministic parallel
programs. The solution consists of a combination of record/replay with automatic on-the-fly …

[PDF][PDF] The lttng tracer: A low impact performance and behavior monitor for gnu/linux

M Desnoyers, MR Dagenais - OLS (Ottawa Linux Symposium), 2006 - Citeseer
Efficient tracing of system-wide execution, allowing integrated analysis of both kernel space
and user space, is something difficult to achieve. The following article will present you a new …

Ksplice: Automatic rebootless kernel updates

J Arnold, MF Kaashoek - Proceedings of the 4th ACM European …, 2009 - dl.acm.org
Ksplice allows system administrators to apply patches to their operating system kernels
without rebooting. Unlike previous hot update systems, Ksplice operates at the object code …

Detecting past and present intrusions through vulnerability-specific predicates

A Joshi, ST King, GW Dunlap, PM Chen - ACM SIGOPS Operating …, 2005 - dl.acm.org
Most systems contain software with yet-to-be-discovered security vulnerabilities. When a
vulnerability is disclosed, administrators face the grim reality that they have been running …