DYNAMIC INSTRUMENTATION TECHNIQUE Russian patent published in 2010 - IPC G06F9/00 

Abstract RU 2390821 C1

FIELD: information technology.

SUBSTANCE: method involves steps for compiling the analysed program with debugging information and installation of a breakpoint upon request for variable monitoring on a specified address. Between operations for compiling the analysed program and inserting breakpoints, the following operations are also carried out: an address and variable information are extracted from the binary code with debugging information in the main system. The debugging information is extracted from the binary code and the amount of debugging information is reduced by selecting on the required information from it and the extracted information is sent to the tracing program on the device. The user sends the extracted information on instruction addresses, location of variables and their intended sizes, and, using the reduced debugging information, the tracing program gives breakpoints and collects data from the binary code without debugging information during program execution.

EFFECT: lesser resources of a computer system used during dynamic instrumentation.

3 cl, 3 dwg

Similar patents RU2390821C1

Title Year Author Number
DYNAMIC INSTRUMENTATION TECHNIQUE 2008
  • Gerenkov Aleksej Anatol'Evich
  • Gorelkina Ekaterina Anatol'Evna
RU2390831C1
METHOD OF DETERMINING MEMORY MISUSE 2011
  • Gorelkina Ekaterina Anatol'Evna
  • Jong Zhajkhun
  • Akhn Khunzhu
RU2458386C1
DEBUGGING NATIVE CODE BY TRANSITIONING FROM EXECUTION IN NATIVE MODE TO EXECUTION IN INTERPRETED MODE 2014
  • Koltachev, Mikhail
  • Khandelval, Nikkhil
  • Gandi, Akrosh
RU2668973C2
SYSTEM AND METHOD FOR INTERPRETING AND ANALYZING DYNAMIC CHARACTERISTICS OF THE CURRENT STATE OF TASKS PERFORMED 2016
  • Antonov Aleksandr Sergeevich
  • Voevodin Vadim Vladimirovich
  • Voevodin Vladimir Valentinovich
  • Zhumatij Sergej Anatolevich
  • Nikitenko Dmitrij Aleksandrovich
  • Stefanov Konstantin Sergeevich
  • Teplov Aleksej Mikhajlovich
  • Shvets Pavel Artemovich
RU2649748C2
METHOD OF DETECTING MALWARE IN OPERATING SYSTEM KERNEL 2012
  • Tumojan Evgenij Petrovich
  • Ol'Shanov Konstantin Dmitrievich
  • Cherementsev Sergej Nikolaevich
RU2510075C2
ARTIFICIAL INTELLIGENCE BASED COMPUTER SECURITY SYSTEM 2017
  • Hasan, Syed Kamran
RU2750554C2
METHOD FOR DETECTING ANOMALOUS EVENTS ON BASIS OF CONVOLUTION ARRAY OF SAFETY EVENTS 2017
  • Monastyrskij Aleksej Vladimirovich
  • Pavlyushchik Mikhail Aleksandrovich
  • Romanenko Aleksej Mikhajlovich
  • Golovkin Maksim Yurevich
RU2673711C1
CACHE-BASED TRACE PLAYBACK BREAKPOINTS USING TAG FIELD RESERVED BITS 2019
  • Mola, Jordi
RU2769785C1
METHOD AND SYSTEM FOR STATIC ANALYSIS OF EXECUTABLE FILES BASED ON PREDICTIVE MODELS 2020
  • Prudkovskij Nikolaj Sergeevich
RU2759087C1
METHOD OF THE ANOMALOUS EVENTS DETECTING BY THE EVENT DIGEST POPULARITY 2017
  • Monastyrskij Aleksej Vladimirovich
  • Pavlyushchik Mikhail Aleksandrovich
  • Romanenko Aleksej Mikhajlovich
  • Golovkin Maksim Yurevich
RU2651196C1

RU 2 390 821 C1

Authors

Gerenkov Aleksej Anatol'Evich

Komkov Leonid Vladimirovich

Dates

2010-05-27Published

2008-10-23Filed