官术网_书友最值得收藏!

Advanced function-tracing software

In 2013, I designed a tool that traces function calls. It is quite similar to strace and ltrace, but instead of tracing syscalls or library calls, it traces every function call made from the executable. This tool was covered in Chapter 2, The ELF Binary Format, but it is quite relevant to the topic of ptrace. This is because it is completely dependent on ptrace and performs some pretty wicked dynamic analysis using control flow monitoring. The source code can be found on GitHub:

https://github.com/leviathansecurity/ftrace

主站蜘蛛池模板: 新丰县| 莒南县| 中西区| 汉阴县| 永丰县| 稻城县| 池州市| 洛浦县| 同江市| 贵港市| 泾川县| 丽水市| 博湖县| 木里| 西乌| 娱乐| 新河县| 鸡西市| 辉县市| 京山县| 长寿区| 綦江县| 奉新县| 永春县| 临海市| 宝坻区| 垣曲县| 榕江县| 兴文县| 进贤县| 镶黄旗| 龙胜| 贵港市| 海门市| 大埔区| 徐闻县| 丽水市| 广元市| 崇州市| 鞍山市| 永善县|