How to shadow every byte of memory used by a program

@inproceedings{Nethercote2007HowTS,
  title={How to shadow every byte of memory used by a program},
  author={Nicholas Nethercote and Julian Seward},
  booktitle={VEE},
  year={2007}
}
Several existing dynamic binary analysis tools use shadowmemory-they shadow, in software, every byte of memory used by a program with another value that says something about it. Shadow memory is difficult to implement both efficiently and robustly. Nonetheless, existing shadow memory implementations have not been studied in detail. This is unfortunate, because shadow memory is powerful-for example, some of the existing tools that use it detect critical errors such as bad memory accesses, data… CONTINUE READING
Highly Influential
This paper has highly influenced a number of papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 208 citations. REVIEW CITATIONS

2 Figures & Tables

Topics

Statistics

0102030'07'08'09'10'11'12'13'14'15'16'17'18
Citations per Year

209 Citations

Semantic Scholar estimates that this publication has 209 citations based on the available data.

See our FAQ for additional information.