官术网_书友最值得收藏!

Advanced function-tracing software

In 2013, I designed a tool that traces function calls. It is quite similar to strace and ltrace, but instead of tracing syscalls or library calls, it traces every function call made from the executable. This tool was covered in Chapter 2, The ELF Binary Format, but it is quite relevant to the topic of ptrace. This is because it is completely dependent on ptrace and performs some pretty wicked dynamic analysis using control flow monitoring. The source code can be found on GitHub:

https://github.com/leviathansecurity/ftrace

主站蜘蛛池模板: 铁岭市| 运城市| 新乡市| 辉南县| 鲜城| 淮北市| 特克斯县| 南昌市| 九台市| 泽库县| 宣汉县| 德化县| 多伦县| 玉龙| 富顺县| 清水河县| 资兴市| 克东县| 华阴市| 香河县| 洛浦县| 郎溪县| 邵阳市| 岢岚县| 蓬安县| 江安县| 绥阳县| 黔南| 水富县| 旺苍县| 玉田县| 龙海市| 富锦市| 汪清县| 金沙县| 噶尔县| 乌拉特前旗| 绵阳市| 山东省| 卓尼县| 辽宁省|