PIEtrace: Platform independent executable trace
暂无分享,去创建一个
[1] Philipp Alexander Sommer,et al. Wireless embedded systems: time, location, and applications , 2011 .
[2] John S. Baras,et al. ATEMU: a fine-grained sensor network simulator , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[3] Heng Yin,et al. Renovo: a hidden code extractor for packed executables , 2007, WORM '07.
[4] Satish Narayanasamy,et al. BugNet: continuously recording program execution for deterministic replay debugging , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[5] Jason Nieh,et al. Record and transplay: partial checkpointing for replay debugging across heterogeneous systems , 2011, PERV.
[6] Michael D. Bond,et al. Tracking bad apples: reporting the origin of null and undefined value errors , 2007, OOPSLA.
[7] David Keppel,et al. Shade: a fast instruction-set simulator for execution profiling , 1994, SIGMETRICS.
[8] Min Xu,et al. A "flight data recorder" for enabling full-system multiprocessor deterministic replay , 2003, ISCA '03.
[9] Christopher Krügel,et al. Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries , 2010, 2010 IEEE Symposium on Security and Privacy.
[10] Srikanth Kandula,et al. Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging , 2004, USENIX Annual Technical Conference, General Track.
[11] Adrian Perrig,et al. XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms , 2011, 2011 44th Hawaii International Conference on System Sciences.
[12] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[13] Sanjay Bhansali,et al. Framework for instruction-level tracing and analysis of program executions , 2006, VEE '06.
[14] Qijun Gu,et al. Towards self-propagate mal-packets in sensor networks , 2008, WiSec '08.
[15] R. Hookway. DIGITAL FX!32 running 32-Bit x86 applications on Alpha NT , 1997, Proceedings IEEE COMPCON 97. Digest of Papers.
[16] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[17] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[18] Peng Li,et al. T-check: bug finding for sensor networks , 2010, IPSN '10.
[19] Min Xu. ReTrace : Collecting Execution Trace with Virtual Machine Deterministic Replay , 2007 .
[20] Yangchun Fu,et al. Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection , 2012, 2012 IEEE Symposium on Security and Privacy.
[21] Xiangyu Zhang,et al. Whole Execution Traces , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[22] J. Larus. Whole program paths , 1999, PLDI '99.
[23] Yan Tang,et al. Efficient checkpointing of java software using context-sensitive capture and replay , 2007, ESEC-FSE '07.
[24] Xiangyu Zhang,et al. Obfuscation resilient binary code reuse through trace-oriented programming , 2013, CCS.
[25] Angelos D. Keromytis,et al. ASSURE: automatic software self-healing using rescue points , 2009, ASPLOS.
[26] Yagiz Onat Yazir,et al. Maitland: Lighter-Weight VM Introspection to Support Cyber-security in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[27] Michael Stonebraker,et al. Aurora: a new model and architecture for data stream management , 2003, The VLDB Journal.
[28] Wenke Lee,et al. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[29] Yasushi Saito,et al. Jockey: a user-space library for record-replay debugging , 2005, AADEBUG'05.
[30] Jonathon T. Giffin,et al. 2011 IEEE Symposium on Security and Privacy Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection , 2022 .
[31] Claudia Eckert,et al. A Universal Semantic Bridge for Virtual Machine Introspection , 2011, ICISS.
[32] Somesh Jha,et al. OmniUnpack: Fast, Generic, and Safe Unpacking of Malware , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[33] Tal Garfinkel,et al. VMwareDecoupling Dynamic Program Analysis from Execution in Virtual Environments , 2008, USENIX Annual Technical Conference.
[34] Stephen McCamant,et al. Binary Code Extraction and Interface Identification for Security Applications , 2009, NDSS.
[35] Ion Stoica,et al. ODR: output-deterministic replay for multicore debugging , 2009, SOSP '09.
[36] Kamin Whitehouse,et al. Clairvoyant: a comprehensive source-level debugger for wireless sensor networks , 2007, SenSys '07.
[37] Anant Agarwal,et al. TraceBack: first fault diagnosis by reconstruction of distributed control flow , 2005, PLDI '05.
[38] George Candea,et al. S2E: a platform for in-vivo multi-path analysis of software systems , 2011, ASPLOS XVI.