Posters |
||
![]() |
"Anatomy of a Dyninst Program" [ PDF ] "Binary Modifications with Dyninst: Hot-patching Apache Security Flaws" [ PDF ] "The Deconstruction of Dyninst" [ PDF ]
"Detecting Code Reuse Attacks Using Dyninst Components" "Extracting and Visualizing Security Properties Using Self-Propelled Instrumentation" [ PDF ] "DyninstAPI: A Binary Instrumentation and Analysis Tool" [ PDF ] "Mining Software Repositories for Accurate Authorship" [ PDF ] "Mixed-Precision Floating-Point Adaptation" [ PDF ] "MRNet: Multicast/Reduction Network: Scalable Communication for Extreme Scale Systems" [ PDF ]
"Mr. Scan: Density-Based Clustering for Extreme Scale Systems"
"Scalable Failure Recovery for Tree-Based Overlay Networks" "SD-Dyninst: Static-Dynamic Malware Analysis" [ PDF ] "Security Through Runtime Relocation: Function Relocation in Edited Binaries" [ PDF ] "The Stack Trace Analysis Tool: Enabling Million-way Debugging" [ PDF ] "StackWalker Analysis Tool" [ PDF ] "The StackwalkerAPI: A Cross-Platform API for Collecting Accurate Stackwalks" [ PDF ] "Tools Projects Using Dyninst/MRNet" [ PDF ] | ![]() |

