FIELD: information technology.
SUBSTANCE: method involves steps for compiling the analysed program with debugging information and installation of a breakpoint upon request for variable monitoring on a specified address. Between operations for compiling the analysed program and inserting breakpoints, the following operations are also carried out: an address and variable information are extracted from the binary code with debugging information in the main system. The debugging information is extracted from the binary code and the amount of debugging information is reduced by selecting on the required information from it and the extracted information is sent to the tracing program on the device. The user sends the extracted information on instruction addresses, location of variables and their intended sizes, and, using the reduced debugging information, the tracing program gives breakpoints and collects data from the binary code without debugging information during program execution.
EFFECT: lesser resources of a computer system used during dynamic instrumentation.
3 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
DYNAMIC INSTRUMENTATION TECHNIQUE | 2008 |
|
RU2390831C1 |
METHOD OF DETERMINING MEMORY MISUSE | 2011 |
|
RU2458386C1 |
METHOD FOR DEBUGGING MULTI-CORE MULTI-PROCESS COMPUTER SYSTEMS WITH REAL-TIME CONTROL MECHANISM | 2024 |
|
RU2830957C1 |
DEBUGGING NATIVE CODE BY TRANSITIONING FROM EXECUTION IN NATIVE MODE TO EXECUTION IN INTERPRETED MODE | 2014 |
|
RU2668973C2 |
SYSTEM AND METHOD FOR INTERPRETING AND ANALYZING DYNAMIC CHARACTERISTICS OF THE CURRENT STATE OF TASKS PERFORMED | 2016 |
|
RU2649748C2 |
ARTIFICIAL INTELLIGENCE BASED COMPUTER SECURITY SYSTEM | 2017 |
|
RU2750554C2 |
METHOD OF DETECTING MALWARE IN OPERATING SYSTEM KERNEL | 2012 |
|
RU2510075C2 |
METHOD AND SYSTEM FOR CHECKING AVAILABILITY OF INFORMATION RESOURCE AND CONTENT ON IT IN COMPUTER NETWORKS | 2023 |
|
RU2829699C1 |
METHOD FOR DETECTING ANOMALOUS EVENTS ON BASIS OF CONVOLUTION ARRAY OF SAFETY EVENTS | 2017 |
|
RU2673711C1 |
CACHE-BASED TRACE PLAYBACK BREAKPOINTS USING TAG FIELD RESERVED BITS | 2019 |
|
RU2769785C1 |
Authors
Dates
2010-05-27—Published
2008-10-23—Filed