14 Questions 17 Answers 0 Followers
Questions related from Hussien Al-haj Ahmad
Is it necessary to implement the other methods to compare with the proposed method, or is it acceptable to rely on the results presented in those methods, especially when it's not feasible to...
22 November 2023 5,638 0 View
I have developed a new technique. Although I have performed multiple experiments and obtained various "meaningful" results, I am unsure about how to evaluate the technique's performance and ensure...
10 May 2023 9,720 6 View
Suppose we have two programs. The program A is in binary form (ELF file), and the second program is a shred object file, say SO. I want to hook some instruction in the program A and move execution...
12 January 2023 9,661 5 View
Assume we have a program with different instructions. Due to some limitations in the field, it is not possible to test all the instructions. Instead, assume we have tested 4 instructions and...
31 October 2022 3,772 3 View
How could we profile a c program in order to obtain detailed information related to its executed instructions (Dynamic Instructions)? I'm looking for a tool with which I can use it to obtain...
19 July 2021 1,587 6 View
In one of the articles, I read the following hypothesis: We assume that the processor’s control logic is protected against faults via control-flow checking. Regarding ARM processors, I wonder if...
02 May 2021 399 2 View
For a given binary string with a length of 32bit, all possible combinations are 2^32. Assume we want to hash each value and put it in a hashmap. I wonder, is that possible in java? what about...
12 February 2021 5,919 2 View
In order to improve dependability of a given processor, e.g., ARM processor, vulnerability analysis can be carried out at different levels, for example: architectural vulnerability analysis,...
14 May 2020 760 0 View
Sometimes in order to gain better performance in terms of execution time, inline assembly within source code is used. For example, it is possible to write assembly code inside C code to...
08 December 2019 1,465 6 View
The question may be somewhat unclear Using the Dyninst (Dynamic binary instrumentation) tool, we can inspect a binary file in order to understand the behavior of execution. I want to insert "STORE...
11 September 2018 9,756 0 View
The accuracy of hardware performance counters measurements is discussed widely in the literature. Using hardware performance counters, we can measure many types of micro-architecture events, such...
21 August 2018 9,461 2 View
As we know, the ptrace system call is the most powerful system call in all unix-like systems. All debugging software use ptrace for monitoring and manipulating another process, i.e. tracee. Using...
03 March 2018 2,949 2 View
Is there a way to measure elapsed time running the program under gdb? Look to this: Assume that we are debugging a file and in...
24 September 2016 5,452 4 View
I am working on safety critical system and now I am attempting to introduce a software technique for control flow checking. Control Flow Error or CFE which happens due to the transient fault...
15 September 2016 4,436 2 View