官术网_书友最值得收藏!

Advanced function-tracing software

In 2013, I designed a tool that traces function calls. It is quite similar to strace and ltrace, but instead of tracing syscalls or library calls, it traces every function call made from the executable. This tool was covered in Chapter 2, The ELF Binary Format, but it is quite relevant to the topic of ptrace. This is because it is completely dependent on ptrace and performs some pretty wicked dynamic analysis using control flow monitoring. The source code can be found on GitHub:

https://github.com/leviathansecurity/ftrace

主站蜘蛛池模板: 石河子市| 山阴县| 安国市| 湘潭市| 日土县| 新乡市| 安平县| 普定县| 龙门县| 长泰县| 文安县| 潍坊市| 蚌埠市| 彰化市| 清新县| 深泽县| 徐闻县| 怀宁县| 同仁县| 衡南县| 新和县| 长子县| 海门市| 新兴县| 乌拉特中旗| 洛川县| 闻喜县| 磐石市| 民县| 石棉县| 冕宁县| 邯郸县| 常州市| 射洪县| 昭平县| 屏山县| 洛隆县| 资中县| 从化市| 嘉义县| 格尔木市|