previous | index | next |
| ||
Security attacks involve a transfer of control to malicious code. Since all application code (including abnormal control transfers) executes only in the code cache, and code cache transfers are carefully controlled, DynamoRIO is in a perfect position to monitor all control transfers during program execution. | ||
Copyright © 2004 Derek Bruening |