scispace - formally typeset
Journal ArticleDOI

Pin: building customized program analysis tools with dynamic instrumentation

Reads0
Chats0
TLDR
The goals are to provide easy-to-use, portable, transparent, and efficient instrumentation, and to illustrate Pin's versatility, two Pintools in daily use to analyze production software are described.
Abstract
Robust and powerful software instrumentation tools are essential for program analysis tasks such as profiling, performance evaluation, and bug detection. To meet this need, we have developed a new instrumentation system called Pin. Our goals are to provide easy-to-use, portable, transparent, and efficient instrumentation. Instrumentation tools (called Pintools) are written in C/C++ using Pin's rich API. Pin follows the model of ATOM, allowing the tool writer to analyze an application at the instruction level without the need for detailed knowledge of the underlying instruction set. The API is designed to be architecture independent whenever possible, making Pintools source compatible across different architectures. However, a Pintool can access architecture-specific details when necessary. Instrumentation with Pin is mostly transparent as the application and Pintool observe the application's original, uninstrumented behavior. Pin uses dynamic compilation to instrument executables while they are running. For efficiency, Pin uses several techniques, including inlining, register re-allocation, liveness analysis, and instruction scheduling to optimize instrumentation. This fully automated approach delivers significantly better instrumentation performance than similar tools. For example, Pin is 3.3x faster than Valgrind and 2x faster than DynamoRIO for basic-block counting. To illustrate Pin's versatility, we describe two Pintools in daily use to analyze production software. Pin is publicly available for Linux platforms on four architectures: IA32 (32-bit x86), EM64T (64-bit x86), Itanium®, and ARM. In the ten months since Pin 2 was released in July 2004, there have been over 3000 downloads from its website.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Deep Learning-Based Hybrid Fuzz Testing

TL;DR: This paper presents a new deep learning-based hybrid testing method using symbolic execution and fuzzing that tries to predict paths that are suitable for fuzzing and guide the fuzzing to reach the paths.

libdft : Dynamic Data Flow Tracking for the Masses

TL;DR: libdft as discussed by the authors is a dynamic data flow tracking framework that is at once fast, reusable, and works with commodity software and hardware . In addition, it provides an API for building DFT-enabled tools that work on unmodified binaries, running on common operating systems and hardware, thus facilitating research and rapid prototyping.
Posted Content

Coarse-grained Dynamic Taint Analysis for Defeating Control and Non-control Data Attacks

TL;DR: This work describes a coarse-grained taint analysis technique that uses information flow tracking at the level of application data objects that propagates a one-bit taint over each application object that is modified by untrusted data thereby reducing the taint management overhead considerably.
Book ChapterDOI

Software Streams: Big Data Challenges in Dynamic Program Analysis

TL;DR: This paper explores how recent results in algorithmic theory for data-intensive scenarios can be applied to the design and implementation of dynamic program analysis tools, focusing on two important techniques: sampling and streaming.
Book ChapterDOI

CppIns: A Source Query Language for Instrumentation

TL;DR: A query-based method locating points where codes to be planted and collecting contextual information so that generated codes could contain variables around the points, which is constructed following a SQL-like style and easily understood.
References
More filters
Proceedings ArticleDOI

Automatically characterizing large scale program behavior

TL;DR: This work quantifies the effectiveness of Basic Block Vectors in capturing program behavior across several different architectural metrics, explores the large scale behavior of several programs, and develops a set of algorithms based on clustering capable of analyzing this behavior.
Proceedings ArticleDOI

ATOM: a system for building customized program analysis tools

TL;DR: ATOM as mentioned in this paper is a single framework for building a wide range of customized program analysis tools, including block counting, profiling, dynamic memory recording, instruction and data cache simulation, pipeline simulation, evaluating branch prediction, and instruction scheduling.
Journal ArticleDOI

SPEC CPU2000: measuring CPU performance in the New Millennium

J.L. Henning
- 01 Jul 2000 - 
TL;DR: CPU2000 as mentioned in this paper is a new CPU benchmark suite with 19 applications that have never before been in a SPEC CPU suite, including high-performance numeric computing, Web servers, and graphical subsystems.
Journal ArticleDOI

An API for Runtime Code Patching

TL;DR: The authors present a postcompiler program manipulation tool called Dyninst, which provides a C++ class library for program instrumentation that permits machine-independent binary instrumentation programs to be written.
Journal ArticleDOI

Valgrind: A Program Supervision Framework

TL;DR: Valgrind is a programmable framework for creating program supervision tools such as bug detectors and profilers that executes supervised programs using dynamic binary translation, giving it total control over their every part without requiring source code, and without the need for recompilation or relinking prior to execution.