Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,287 papers from all fields of science
Search
Sign In
Create Free Account
Pin (computer program)
Known as:
PIN
Pin is a platform for creating analysis tools. A pin tool comprises instrumentation, analysis and callback routines. Instrumentation routines are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Android
Application programming interface
Dynamic program analysis
DynamoRIO
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Performance Study of Catmull-Clark Subdivision Surfaces Algorithm
A. Ghandour
,
Walid J. Ghandour
,
H. Diab
,
A. Nasri
International Conference on Wireless…
2020
Corpus ID: 220889317
Generating smooth surfaces of arbitrary topology is a major challenge in geometric modeling, computer graphics, and scientific…
Expand
Review
2018
Review
2018
NUMAPROF, A NUMA Memory Profiler
S. Valat
,
O. Bouizi
Euro-Par Workshops
2018
Corpus ID: 57662132
The number of cores in HPC systems and servers increased a lot for the last few years. In order to also increase the available…
Expand
2013
2013
Improved defense method against non-control-data attacks
Li Xiao-lon
2013
Corpus ID: 63793268
Non-control-data attack is a new attack method which corrupts security data instead of the target program's control data…
Expand
2012
2012
Buffer Overflow Vulnerability Location Technology Based on Code Instrumentation
Sheng-li Shi
2012
Corpus ID: 215943727
In order to find buffer overflow vulnerability point accurately and rapidly,this paper proposes a method that can find buffer…
Expand
2012
2012
Pin (Computer Program)
Edv Informatik
2012
Corpus ID: 65673969
2011
2011
Optimization of naïve dynamic binary instrumentationTools/; Helping programmers write fast instrumentation toolswith DynamoRIO
R. Kleckner
2011
Corpus ID: 196178348
The proliferation of dynamic program analysis tools has done much to ease the burden of developing complex software. However…
Expand
2007
2007
Virtualization-assisted Framework for Prevention of Software Vulnerability Based Security Attacks
N. Aaraj
,
A. Raghunathan
,
N. Jha
2007
Corpus ID: 12711296
Virtualization is a useful technology for addressing secur ity concerns since it allows for the creation of isolated software…
Expand
2006
2006
Transaction confirmation of the method and system
マクレラン、スコット
,
リベキーニ、ファウスト
,
ロンゴバルディ、ロベルト
2006
Corpus ID: 196030081
The present invention relates for example, a method and system for authenticating a presentation from the client to the server in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE