previous index next

Security attacks involve a transfer of control to malicious code. Since all application code (including abnormal control transfers) executes only in the code cache, and code cache transfers are carefully controlled, DynamoRIO is in a perfect position to monitor all control transfers during program execution.

  Copyright © 2004 Derek Bruening