Program Execution Tracer based on Dynamic Binary Instrumentation

Chang Da,Li Zhou-jun,Yang Tian-fang,Hu Chao-jian
DOI: https://doi.org/10.3969/j.issn.1674-9456.2011.09.009
2011-01-01
Abstract:The differences of system platform,compiler and compilation options are likely to lead semantic differences between source code and executable code,only source code analysis may omit vulnerabilities hidden in executable code.Even source code analysis has verified the nature of the need for security,but yet it can not assure the security nature in the executable code are satisfied not contrary to.This paper designed and implemented a program execution tracer based on dynamic binary instrumentation.The results show our prototype tool can accurately trace in the execution path,and be able to filter out 90% to 99% secondary instructions.At last,this paper discussed other technical solutions,the shortcoming of current prototype tool and the future work.
What problem does this paper attempt to address?