Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,786,653 papers from all fields of science
Search
Sign In
Create Free Account
X86 debug register
Known as:
DR1 register
, DR0 register
, Debug register
Expand
On the x86 architecture, a debug register is a register used by a processor for program debugging. There are six debug registers, named DR0...DR7…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Breakpoint
Cold boot attack
Computer program
Control register
Expand
Broader (1)
Debugging
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Kernel data race detection using debug register in Linux
Yunyun Jiang
,
Yi Yang
,
Tian Xiao
,
Tianwei Sheng
,
Wenguang Chen
IEEE COOL Chips XVII
2014
Corpus ID: 3168942
Data races in parallel programs are notoriously difficult to detect and resolve. Existing research has mostly focused on data…
Expand
2012
2012
Debug register rootkits : A study of malicious use of the IA-32 debug registers
Emil Persson
,
Joel Mattsson
2012
Corpus ID: 60566673
The debug register rootkit is a special type of rootkit that has existed for over a decade, and is told to be undetectable by any…
Expand
2011
2011
A Lightweight Access Log Filter of Windows OS Using Simple Debug Register Manipulation
R. Ando
,
K. Suzaki
FGIT-SecTech
2011
Corpus ID: 19832744
Recently, leveraging hypervisor for inspecting Windows OS which is called as VM instospection has been proposed. In this paper…
Expand
2011
2011
Rootkits and Malicious Code Injection
Marius Vlad
2011
Corpus ID: 15571632
Rootkits are considered by many to be one of the most stealthy computer malware (malicious software) and pose significant threats…
Expand
2011
2011
System Introspection with Hardware Watchmachines
Nicholas Hunt
,
Brandon Lucia
,
L. Ceze
2011
Corpus ID: 17119764
Unfortunately, current introspection mechanisms usually impose a high performance overhead or are difficult for programmers to…
Expand
2009
2009
A System for Detecting, Preventing and Exposing Atomicity Violations in Multithreaded Programs
Lee Chew
2009
Corpus ID: 1238506
Multi-core machines have become common and have led to an increase in multithreaded software. In turn, the number of concurrency…
Expand
2008
2008
Chapter 6 – Anti-Reversing
D. Kaminsky
2008
Corpus ID: 57077268
2008
2008
Incident-Driven Memory Snapshot for Full-Virtualized OS Using Interruptive Debugging Techniques
Ruo Ando
,
Y. Kadobayashi
,
Youichi Shinoda
International Symposium on Algorithms
2008
Corpus ID: 15700477
Memory forensics is growing concern. For effective evidence retrieval, it is important to take snapshot timely. With proper…
Expand
2003
2003
CIH Data Corruption and A Data Recovery Technique in FAT 32 Systems
A. Rahman
,
Shafquat Rahman
,
A. Rahman
,
M. Islam
2003
Corpus ID: 14095426
Virus is a very important phenomenon in to-days world. Day in day out, new virii are being spawn by virus writers all over the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required