Memory Dump Analysis Anthology

Size: px
Start display at page:

Download "Memory Dump Analysis Anthology"

Transcription

1 Memory Dump Analysis Anthology Volume 6 Dmitry Vostokov Software Diagnostics Institute OpenTask

2 2 Published by OpenTask, Republic of Ireland Copyright 2013 by Dmitry Vostokov Copyright 2015 by Software Diagnostics Institute All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior written permission of the publisher. You must not circulate this book in any other binding or cover, and you must impose the same condition on any acquirer. OpenTask books are available through booksellers and distributors worldwide. For further information or comments send requests to press@opentask.com. Product and company names mentioned in this book may be trademarks of their owners. A CIP catalog record for this book is available from the British Library. ISBN-13: (Paperback) ISBN-13: (Hardback) First printing, 2013 Revision 2 (July 2015)

3 3 Summary of Contents Preface Acknowledgements PART 1: Professional Crash Dump Analysis and Debugging PART 2: Crash Dump Analysis Patterns PART 3: Pattern Interaction PART 4: Unified and Generative Debugging PART 5: A Bit of Science and Philosophy PART 6: Fun with Crash Dumps PART 7: A Bit of Religion PART 8: Software Trace Analysis PART 9: Software Trace Analysis Patterns PART 10: Software Troubleshooting and Debugging PART 11: Software Victimology PART 12: Art PART 13: Miscellaneous PART 14: Intelligence Analysis Appendix Index of WinDbg Commands About the Author

4 4 Cover Images

5 5 Contents Preface Acknowledgements PART 1: Professional Crash Dump Analysis and Debugging Memory Dump Analysis Best Practices Windows Debugging Expert System WinDbg Extension Common Mistakes Not Comparing to Reference Debugger Output From Bugchecks to Patterns Raw Stack from Laterally Damaged Memory Dumps WinDbg Tips and Tricks: Getting the Bottom of a Stack Trace PART 2: Crash Dump Analysis Patterns Divide by Zero (Kernel Mode) Fat Process Dump Blocked Queue Crash Signature Invalid Parameter (Process Heap) Hooking Level Embedded Comments Well-Tested Module... 48

6 6 String Parameter Environment Hint Dual Stack Trace Blocking Module Wait Chain (Window Messaging) Wait Chain (Named Pipes) Top Module Dialog Box Technology-Specific Subtrace (COM Interface Invocation) Livelock Semantic Structure (PID.TID) Instrumentation Side Effect Directing Module Stack Overflow (Software Implementation) Data Correlation Truncated Stack Trace Least Common Frame Self-Diagnosis (Kernel Mode) Technology-Specific Subtrace (Dynamic Memory) Module Hint... 92

7 7 Custom Exception Handler (Kernel Space) No Data Types Cloud Environment Version-Specific Extension Multiple Exceptions (Managed Space) Blocking File Quiet Dump Pleiades Thread Age Unsynchronized Dumps Coupled Modules Managed Stack Trace Problem Vocabulary Activation Context Stack Trace Set Special Thread (.NET CLR) Dynamic Memory Corruption (Managed Heap) Stack Trace Collection (Managed Space) Duplicate Extension Deadlock (Managed Space)

8 8 Caller-n-Callee Handled Exception (User Space) Handled Exception (.NET CLR) Execution Residue (Managed Space) Annotated Disassembly (JIT.NET code) Wait Chain (Mutex Objects) Inline Function Optimization (Managed Code) Technology-Specific Subtrace (JIT.NET Code) Double IRP Completion PART 3: Pattern Interaction Main Thread, Self-Diagnosis, Window Message Chain, Blocking Module, Ubiquitous Component, Dual Stack Trace, Pipe Wait Chain and Coupled Machines Abridged Dump, Embedded Comment, Spiking Thread, Incorrect Stack Trace and Top Module Stack Trace Collection, Message Box, Self-Diagnosis, Version-Specific Extension, Managed Stack Trace and Managed Code Exception PART 4: Unified and Generative Debugging A Periodic Table of Software Defects Analysis, Architectural, Design, Implementation and Usage Debugging Patterns Generative Debugging Metadefect Template Library PART 5: A Bit of Science and Philosophy

9 9 On Memory Perspectives Orbifold Memory Space Notes on Memoidealism M->analysis Memiosphere On Memory-Time vs. Space-Time The Will to Be Memorized The Trinity of Memory Worldview Uses of Memoretics Crossdisciplinary Memoretics as Interdisciplinary Science Private Property on Memory Spaces Coarse vs. Fine Grained DNA of Software Behavior PART 6: Fun with Crash Dumps Music for Debugging Binary Threads Out of Memory and Losing My Data (Comment Impact) Navigating the Long List Debugging Joke Memory Dump Barcodes MessageBox at Dublin Zoo

10 10 CDB for Kids Snow Spike Residue Second Snowfall Spike in Dublin MMXI Happy New Year and Decade of Debugging 0 7DB - 0 7E4! Do Security Professionals Dream? Debugging Slang Golden Bug Beer Time Finger Exercise Resolution Rush The Window of Opportunity Dump Pre-analysis Tapping Having Fun Adult Debugging Second Eye Abscess Finction

11 11 Mad OS and other Publishing Blunders The Ultimate Debugger s Desk Memceptions: Flags and Handles are Everywhere! Computer Memory Monsters On President s Daily Briefs (PDBs) The First Evidence for Process Resurrection Vacuum Pages WinDbg Command on Certificate Pleasing WinDbg SOS Extension Airport Terminal Services Incident Philosophical Self-Interview PART 7: A Bit of Religion Memory Creates God Morality and Memorianity On Natural Theology PART 8: Software Trace Analysis Pattern Interaction Basic Facts, Periodic Error, and Defamiliarizing Effect Close and Deconstructive Readings of a Software Trace Software Tracing Best Practices

12 12 No Longer Seeing Nothing: The Advantage of Patterns PART 9: Software Trace Analysis Patterns Focus of Tracing Event Sequence Order Implementation Discourse News Value Master Trace Gossip Impossible Trace Glued Activity Message Invariant UI Message Original Message PART 10: Software Troubleshooting and Debugging Debugware Patterns System Description Snapshot Debugging in 2021: Trends for the Next Decade The Way of Philip Marlowe: Abductive Reasoning for Troubleshooting and Debugging Workaround Patterns Fake API

13 13 User Interface Problem Analysis Patterns Message Box PART 11: Software Victimology Function Activity Theory PART 12: Art No E-numbers Software Product Sticker Paleo-debugging: Excavated Minidump Stack Trace Art Debugger s Dream Defect in Defect Memorianity Cross Memioart: The New Art Form Clouded Cloud Traces What Is To Be Done? PART 13: Miscellaneous GI Index of Memory Dump Analysis The New School of Debugging TestWER Tool to Test Windows Error Reporting Moving to ARM

14 14 The New School of Debugging: What s New A.C.P. Root Cause Analysis Methodology TestWAER Tool to Test Windows Azure Error Reporting PART 14: Intelligence Analysis Intelligence Analysis Patterns The Birth of Memory Intelligence Agency Appendix Memory Analysis as a Service Stack Overflow Patterns NET / CLR / Managed Space Patterns Stack Trace Patterns Symbol Patterns Analysis Compass Software Trace Analysis Checklist Crash Dump Analysis Checklist Index of WinDbg Commands About the Author Cover Images

Encyclopedia of Crash Dump Analysis Patterns

Encyclopedia of Crash Dump Analysis Patterns Encyclopedia of Crash Dump Analysis Patterns Detecting Abnormal Software Structure and Behavior in Computer Memory Dmitry Vostokov Software Diagnostics Institute OpenTask 2 Published by OpenTask, Republic

More information

Encyclopedia of Crash Dump Analysis Patterns Second Edition

Encyclopedia of Crash Dump Analysis Patterns Second Edition Encyclopedia of Crash Dump Analysis Patterns Second Edition Detecting Abnormal Software Structure and Behavior in Computer Memory Dmitry Vostokov Software Diagnostics Institute OpenTask 2 Published by

More information

You must not circulate this book in any other binding or cover, and you must impose the same condition on any acquirer.

You must not circulate this book in any other binding or cover, and you must impose the same condition on any acquirer. Published by OpenTask, Republic of Ireland Copyright 2016 by OpenTask Copyright 2016 by Software Diagnostics Services Copyright 2016 by Dmitry Vostokov All rights reserved. No part of this book may be

More information

x64 Windows Debugging

x64 Windows Debugging x64 Windows Debugging Practical Foundations Dmitry Vostokov OpenTask 2 Published by OpenTask, Republic of Ireland Copyright 2009 by Dmitry Vostokov All rights reserved. No part of this book may be reproduced,

More information

Memory Forensics. Presented at VolgaCTF, Russia Inter-Regional Inter-University Open Computer Security Contest

Memory Forensics. Presented at VolgaCTF, Russia Inter-Regional Inter-University Open Computer Security Contest Memory Forensics Presented at VolgaCTF, Russia Inter-Regional Inter-University Open Computer Security Contest www.volgactf.ru Facebook LinkedIn Twitter Dmitry Vostokov Software Diagnostics Institute Forensics

More information

.NET Memory. Dump Analysis. Version 2.0. Dmitry Vostokov Software Diagnostics Services

.NET Memory. Dump Analysis. Version 2.0. Dmitry Vostokov Software Diagnostics Services .NET Memory Dump Analysis Version 2.0 Dmitry Vostokov Software Diagnostics Services WinDbg Commands Prerequisites We use these boxes to introduce some WinDbg commands used in practice exercises Basic.NET

More information

Facebook LinkedIn Twitter. Dmitry Vostokov Software Diagnostics Services

Facebook LinkedIn Twitter. Dmitry Vostokov Software Diagnostics Services Facebook LinkedIn Twitter Dmitry Vostokov Software Diagnostics Services Prerequisites Working C or C++ knowledge Basic assembly language knowledge Audience Novices Learn x64 assembly language Experts Learn

More information

DNWSH - Version: 2.3..NET Performance and Debugging Workshop

DNWSH - Version: 2.3..NET Performance and Debugging Workshop DNWSH - Version: 2.3.NET Performance and Debugging Workshop .NET Performance and Debugging Workshop DNWSH - Version: 2.3 8 days Course Description: The.NET Performance and Debugging Workshop is a practical

More information

Systems software design. Software build configurations; Debugging, profiling & Quality Assurance tools

Systems software design. Software build configurations; Debugging, profiling & Quality Assurance tools Systems software design Software build configurations; Debugging, profiling & Quality Assurance tools Who are we? Krzysztof Kąkol Software Developer Jarosław Świniarski Software Developer Presentation

More information

Windows Debugging: Practical Foundations [Kindle Edition] By Dmitry Vostokov

Windows Debugging: Practical Foundations [Kindle Edition] By Dmitry Vostokov Windows Debugging: Practical Foundations [Kindle Edition] By Dmitry Vostokov Accelerated Windows Memory Dump Analysis: Training - Best price for Accelerated Windows Memory Dump Analysis: Training Course

More information

SELF-AWARE APPLICATIONS AUTOMATIC PRODUCTION DIAGNOSIS DINA GOLDSHTEIN

SELF-AWARE APPLICATIONS AUTOMATIC PRODUCTION DIAGNOSIS DINA GOLDSHTEIN SELF-AWARE APPLICATIONS AUTOMATIC PRODUCTION DIAGNOSIS DINA GOLDSHTEIN Agenda Motivation Hierarchy of self-monitoring CPU profiling GC monitoring Heap analysis Deadlock detection 2 Agenda Motivation Hierarchy

More information

T Hands-on 2. User-mode debuggers OllyDbg

T Hands-on 2. User-mode debuggers OllyDbg T-110.6220 Hands-on 2 User-mode debuggers OllyDbg Disassemblers vs debuggers Static analysis / Disassemblers Theoretic approach Give us a static view of the binary Example: IDA Dynamic analysis / Debuggers

More information

EMBEDDED SYSTEMS: Jonathan W. Valvano INTRODUCTION TO THE MSP432 MICROCONTROLLER. Volume 1 First Edition June 2015

EMBEDDED SYSTEMS: Jonathan W. Valvano INTRODUCTION TO THE MSP432 MICROCONTROLLER. Volume 1 First Edition June 2015 EMBEDDED SYSTEMS: INTRODUCTION TO THE MSP432 MICROCONTROLLER Volume 1 First Edition June 2015 Jonathan W. Valvano ii Jonathan Valvano First edition 3 rd printing June 2015 The true engineering experience

More information

New IDE Application Profiler Enhancements

New IDE Application Profiler Enhancements New IDE Application Profiler Enhancements Authored by: Elena Laskavaia The new Application Profiler features are currently under development for the next release of QNX Momentics. Use the forum and provide

More information

Memory & Thread Debugger

Memory & Thread Debugger Memory & Thread Debugger Here is What Will Be Covered Overview Memory/Thread analysis New Features Deep dive into debugger integrations Demo Call to action Intel Confidential 2 Analysis Tools for Diagnosis

More information

CS266 Software Reverse Engineering (SRE) Reversing and Patching Wintel Machine Code

CS266 Software Reverse Engineering (SRE) Reversing and Patching Wintel Machine Code CS266 Software Reverse Engineering (SRE) Reversing and Patching Wintel Machine Code Teodoro (Ted) Cipresso, teodoro.cipresso@sjsu.edu Department of Computer Science San José State University Spring 2015

More information

Modular SystemC. In-house Training Options. For further information contact your local Doulos Sales Office.

Modular SystemC. In-house Training Options. For further information contact your local Doulos Sales Office. Modular SystemC is a set of modules related to SystemC TM (IEEE 1666-2005) aimed at fulfilling teambased training requirements for engineers from a range of technical backgrounds, i.e. hardware and software

More information

Automating Problem Analysis and Triage. Sasha

Automating Problem Analysis and Triage. Sasha Automating Problem Analysis and Triage Sasha Goldshtein @goldshtn Production Debugging Requirements Obtain actionable information about crashes and errors Obtain accurate performance information Limitations

More information

Arcserve Backup for Windows

Arcserve Backup for Windows Arcserve Backup for Windows Agent for Sybase Guide r17.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

1.1 For Fun and Profit. 1.2 Common Techniques. My Preferred Techniques

1.1 For Fun and Profit. 1.2 Common Techniques. My Preferred Techniques 1 Bug Hunting Bug hunting is the process of finding bugs in software or hardware. In this book, however, the term bug hunting will be used specifically to describe the process of finding security-critical

More information

Quickly Pinpoint and Resolve Problems in Windows /.NET Applications TECHNICAL WHITE PAPER

Quickly Pinpoint and Resolve Problems in Windows /.NET Applications TECHNICAL WHITE PAPER Quickly Pinpoint and Resolve Problems in Windows /.NET Applications TECHNICAL WHITE PAPER Table of Contents Executive Overview...1 Problem Resolution A Major Time Consumer...2 > Inefficiencies of the Problem

More information

Parallel Debugging. ª Objective. ª Contents. ª Learn the basics of debugging parallel programs

Parallel Debugging. ª Objective. ª Contents. ª Learn the basics of debugging parallel programs ª Objective ª Learn the basics of debugging parallel programs ª Contents ª Launching a debug session ª The Parallel Debug Perspective ª Controlling sets of processes ª Controlling individual processes

More information

EMC DOCUMENTUM XTENDER DOMINO NSD ANALYSIS

EMC DOCUMENTUM  XTENDER DOMINO NSD ANALYSIS White Paper EMC DOCUMENTUM EMAILXTENDER DOMINO NSD ANALYSIS Abstract IBM Lotus Domino being one of the supporting email servers by EmailXtender can experience issues related to crash or hangs which could

More information

Learn to develop.net applications and master related technologies.

Learn to develop.net applications and master related technologies. Courses Software Development Learn to develop.net applications and master related technologies. Software Development with Design These courses offer a great combination of both.net programming using Visual

More information

Cortex-R5 Software Development

Cortex-R5 Software Development Cortex-R5 Software Development Course Description Cortex-R5 software development is a three days ARM official course. The course goes into great depth, and provides all necessary know-how to develop software

More information

POMP: Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts

POMP: Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts POMP: Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts Jun Xu 1, Dongliang Mu 12, Xinyu Xing 1, Peng Liu 1, Ping Chen 1, Bing Mao 2 1. Pennsylvania State University 2. Nanjing University

More information

Software Development & Education Center

Software Development & Education Center Software Development & Education Center Embedded Linux & RTOS With ARM 9 µc Embedded Linux and RTOS with ARM9 µc Introduction The course is designed for those who want to pursue Linux based Embedded Systems.

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by machine learning and intelligent automation. By rethinking

More information

Oracle Service Cloud Agent Browser UI. November What s New

Oracle Service Cloud Agent Browser UI. November What s New Oracle Service Cloud Agent Browser UI November 2017 What s New TABLE OF CONTENTS REVISION HISTORY... 3 OVERVIEW... 3 WORKSPACES... 3 Rowspan Workspace Designer Configuration Option... 3 Best Answer Incident

More information

Jackson Marusarz Software Technical Consulting Engineer

Jackson Marusarz Software Technical Consulting Engineer Jackson Marusarz Software Technical Consulting Engineer What Will Be Covered Overview Memory/Thread analysis New Features Deep dive into debugger integrations Demo Call to action 2 Analysis Tools for Diagnosis

More information

SQL Server Whitepaper DEMYSTIFYING DEBUGGING TECHNIQUES WITH SQL SERVER BY PINAL DAVE

SQL Server Whitepaper DEMYSTIFYING DEBUGGING TECHNIQUES WITH SQL SERVER BY PINAL DAVE SQL Server Whitepaper DEMYSTIFYING DEBUGGING TECHNIQUES WITH SQL SERVER BY PINAL DAVE INTRODUCTION The greatest happiness for a father is to see our children grow in front of our very own eyes. My daughter

More information

Cisco Unified CM Trace

Cisco Unified CM Trace Cisco Unified CM Trace Trace, page 1 Configure trace, page 4 Set up troubleshooting trace settings, page 20 Trace Cisco Unified Serviceability provides trace tools to assist you in troubleshooting issues

More information

Simplifying the Development and Debug of 8572-Based SMP Embedded Systems. Wind River Workbench Development Tools

Simplifying the Development and Debug of 8572-Based SMP Embedded Systems. Wind River Workbench Development Tools Simplifying the Development and Debug of 8572-Based SMP Embedded Systems Wind River Workbench Development Tools Agenda Introducing multicore systems Debugging challenges of multicore systems Development

More information

POSIX Threads: a first step toward parallel programming. George Bosilca

POSIX Threads: a first step toward parallel programming. George Bosilca POSIX Threads: a first step toward parallel programming George Bosilca bosilca@icl.utk.edu Process vs. Thread A process is a collection of virtual memory space, code, data, and system resources. A thread

More information

Eliminate Memory Errors to Improve Program Stability

Eliminate Memory Errors to Improve Program Stability Introduction INTEL PARALLEL STUDIO XE EVALUATION GUIDE This guide will illustrate how Intel Parallel Studio XE memory checking capabilities can find crucial memory defects early in the development cycle.

More information

Tech Note 726 Capturing a Memory Dump File Using the Microsoft Debug Diagnostic Tool (32bit)

Tech Note 726 Capturing a Memory Dump File Using the Microsoft Debug Diagnostic Tool (32bit) Tech Note 726 Capturing a Memory Dump File Using the Microsoft Debug Diagnostic Tool (32bit) All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind.

More information

Unicorn: Next Generation CPU Emulator Framework

Unicorn: Next Generation CPU Emulator Framework Unicorn: Next Generation CPU Emulator Framework www.unicorn-engine.org NGUYEN Anh Quynh Syscan360 Beijing - October 21st, 2015 1 / 38 NGUYEN Anh Quynh Unicorn: Next Generation CPU

More information

CSE 4/521 Introduction to Operating Systems

CSE 4/521 Introduction to Operating Systems CSE 4/521 Introduction to Operating Systems Lecture 3 Operating Systems Structures (Operating-System Services, User and Operating-System Interface, System Calls, Types of System Calls, System Programs,

More information

QuickStart Guide 6 - Data Quality

QuickStart Guide 6 - Data Quality QuickStart Guide 6 - Data Quality Document Version: v1.2 Product Version: v2.9 Date: 9 th September 2017 This document provides an overview and Step-by-Step implementation instructions for the clearmdm

More information

Inside Windows Debugging (Developer Reference) PDF

Inside Windows Debugging (Developer Reference) PDF Inside Windows Debugging (Developer Reference) PDF Use Windows debuggers throughout the development cycleâ and build better software Rethink your use of Windows debugging and tracing toolsâ and learn how

More information

Unlocking the Power of OPNET Modeler

Unlocking the Power of OPNET Modeler Unlocking the Power of OPNET Modeler For fast, easy modeling, this practical guide provides all the essential information you need to know. A wide range of topics is covered, including custom protocols,

More information

Frequently Asked Questions about Real-Time

Frequently Asked Questions about Real-Time FAQ: RTX64 2014 Frequently Asked Questions about Real-Time What is Real-Time? Real-time describes an application which requires a response to an event within some small upper bounded time frame. Typically,

More information

Eliminate Threading Errors to Improve Program Stability

Eliminate Threading Errors to Improve Program Stability Introduction This guide will illustrate how the thread checking capabilities in Intel Parallel Studio XE can be used to find crucial threading defects early in the development cycle. It provides detailed

More information

Hands-on Lab Session 9909 Introduction to Application Performance Management: Monitoring. Timothy Burris, Cloud Adoption & Technical Enablement

Hands-on Lab Session 9909 Introduction to Application Performance Management: Monitoring. Timothy Burris, Cloud Adoption & Technical Enablement Hands-on Lab Session 9909 Introduction to Application Performance Management: Monitoring Timothy Burris, Cloud Adoption & Technical Enablement Copyright IBM Corporation 2017 IBM, the IBM logo and ibm.com

More information

SharePoint 2010 Development With Visual Studio 2010 (Microsoft Windows Development Series) PDF

SharePoint 2010 Development With Visual Studio 2010 (Microsoft Windows Development Series) PDF SharePoint 2010 Development With Visual Studio 2010 (Microsoft Windows Development Series) PDF With SharePoint 2010, developers finally have the powerful, end-to-end development tools they need to build

More information

Windows Debugging Notebook: Essential User Space WinDbg Commands By Roberto Alexis Farah READ ONLINE

Windows Debugging Notebook: Essential User Space WinDbg Commands By Roberto Alexis Farah READ ONLINE Windows Debugging Notebook: Essential User Space WinDbg Commands By Roberto Alexis Farah READ ONLINE If searching for the book Windows Debugging Notebook: Essential User Space WinDbg Commands by Roberto

More information

Understanding Trace. Understanding Trace CHAPTER

Understanding Trace. Understanding Trace CHAPTER CHAPTER 6 This chapter, which provides information on Cisco Unified Serviceability trace, contains the following topics:, page 6-1 Trace Configuration, page 6-2 Troubleshooting Trace Settings, page 6-2

More information

ADVANCED trouble-shooting of real-time systems. Bernd Hufmann, Ericsson

ADVANCED trouble-shooting of real-time systems. Bernd Hufmann, Ericsson ADVANCED trouble-shooting of real-time systems Bernd Hufmann, Ericsson AGENDA 1 Introduction 2 3 Timing Analysis 4 References 5 Q&A Trace Compass Overview ADVANCED trouble-shooting of critical real-time

More information

Threads Tuesday, September 28, :37 AM

Threads Tuesday, September 28, :37 AM Threads_and_fabrics Page 1 Threads Tuesday, September 28, 2004 10:37 AM Threads A process includes an execution context containing Memory map PC and register values. Switching between memory maps can take

More information

Using Intel VTune Amplifier XE and Inspector XE in.net environment

Using Intel VTune Amplifier XE and Inspector XE in.net environment Using Intel VTune Amplifier XE and Inspector XE in.net environment Levent Akyil Technical Computing, Analyzers and Runtime Software and Services group 1 Refresher - Intel VTune Amplifier XE Intel Inspector

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

Cortex-M3/M4 Software Development

Cortex-M3/M4 Software Development Cortex-M3/M4 Software Development Course Description Cortex-M3/M4 software development is a 3 days ARM official course. The course goes into great depth and provides all necessary know-how to develop software

More information

VT Advantage System Crashes on the Install PC

VT Advantage System Crashes on the Install PC VT Advantage System Crashes on the Install PC Document ID: 50842 Contents Introduction Prerequisites Requirements Components Used Conventions Set up Your PC to Capture a System Crash Use the Microsoft

More information

TIBCO Spotfire Statement of Direction. Spotfire Product Management

TIBCO Spotfire Statement of Direction. Spotfire Product Management TIBCO Spotfire Statement of Direction Spotfire Product Management CONFIDENTIALITY The following information is confidential information of TIBCO Software Inc. Use, duplication, transmission, or republication

More information

Debugging windows driver tools xp. Debugging windows driver tools xp.zip

Debugging windows driver tools xp. Debugging windows driver tools xp.zip Debugging windows driver tools xp Debugging windows driver tools xp.zip Describes an overview of memory dump file options for Windows 7, the Support Tools for Windows 2000 and Windows XP. about Windows

More information

Debugging and profiling in R

Debugging and profiling in R Debugging and profiling in R Feng Li feng.li@cufe.edu.cn School of Statistics and Mathematics Central University of Finance and Economics June 12, 2014 Revision: June 12, 2014 The basic concepts of debugging

More information

Intel Threading Tools

Intel Threading Tools Intel Threading Tools Paul Petersen, Intel -1- INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS,

More information

LinuxCon North America 2016 Investigating System Performance for DevOps Using Kernel Tracing

LinuxCon North America 2016 Investigating System Performance for DevOps Using Kernel Tracing Investigating System Performance for DevOps Using Kernel Tracing jeremie.galarneau@efficios.com @LeGalarneau Presenter Jérémie Galarneau EfficiOS Inc. Head of Support http://www.efficios.com Maintainer

More information

PE File Browser. by Software Verify

PE File Browser. by Software Verify PE File Browser by Software Verify Copyright Software Verify Limited (c) 2017 PE File Browser PE File contents inspector by Software Verification Welcome to the PE File Browser software tool. PE File Browser

More information

Oracle Hospitality Materials Control Mobile Solutions. Installation and Configuration Guide

Oracle Hospitality Materials Control Mobile Solutions. Installation and Configuration Guide Oracle Hospitality Materials Control Mobile Solutions Installation and Configuration Guide Release 18.1 E99521-03 October 2018 Oracle Hospitality Materials Control Mobile Solutions Installation and Configuration

More information

This guide will show you how to use Intel Inspector XE to identify and fix resource leak errors in your programs before they start causing problems.

This guide will show you how to use Intel Inspector XE to identify and fix resource leak errors in your programs before they start causing problems. Introduction A resource leak refers to a type of resource consumption in which the program cannot release resources it has acquired. Typically the result of a bug, common resource issues, such as memory

More information

IT115: Oracle Database 12c Administration I

IT115: Oracle Database 12c Administration I IT115: Oracle Database 12c Administration I IT115 Rev.001 CMCT COURSE OUTLINE Page 1 of 12 Training Description: In this training, participants will focus on configuration on supported systems. Also, how

More information

Perceptive Experience Healthcare Apps

Perceptive Experience Healthcare Apps Perceptive Experience Healthcare Apps Release Notes Version: 1.2.1 Written by: Product Knowledge, R&D Date: September 2016 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International,

More information

SAMPLE. Preface xi 1 Introducting Microsoft Analysis Services 1

SAMPLE. Preface xi 1 Introducting Microsoft Analysis Services 1 contents Preface xi 1 Introducting Microsoft Analysis Services 1 1.1 What is Analysis Services 2005? 1 Introducing OLAP 2 Introducing Data Mining 4 Overview of SSAS 5 SSAS and Microsoft Business Intelligence

More information

SERVICE-ORIENTED COMPUTING

SERVICE-ORIENTED COMPUTING THIRD EDITION (REVISED PRINTING) SERVICE-ORIENTED COMPUTING AND WEB SOFTWARE INTEGRATION FROM PRINCIPLES TO DEVELOPMENT YINONG CHEN AND WEI-TEK TSAI ii Table of Contents Preface (This Edition)...xii Preface

More information

Memory Analysis. CSF: Forensics Cyber-Security. Part II. Basic Techniques and Tools for Digital Forensics. Fall 2018 Nuno Santos

Memory Analysis. CSF: Forensics Cyber-Security. Part II. Basic Techniques and Tools for Digital Forensics. Fall 2018 Nuno Santos Memory Analysis Part II. Basic Techniques and Tools for Digital Forensics CSF: Forensics Cyber-Security Fall 2018 Nuno Santos Previous classes Files, steganography, watermarking Source of digital evidence

More information

Dmitry Vostokov. Summary. Experience

Dmitry Vostokov. Summary. Experience Dmitry Vostokov Pattern-Oriented Software Diagnostics, Forensics, Prognostics, Root Cause Analysis, Debugging. Diagnostics of Things. dmitry.vostokov@patterndiagnostics.com Summary Dmitry Vostokov is an

More information

Product Security Program

Product Security Program Product Security Program An overview of Carbon Black s Product Security Program and Practices Copyright 2016 Carbon Black, Inc. All rights reserved. Carbon Black is a registered trademark of Carbon Black,

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.

More information

Hunting Security Bugs

Hunting Security Bugs Microsoft Hunting Security Bugs * Tom Gallagher Bryan Jeffries Lawrence Landauer Contents at a Glance 1 General Approach to Security Testing 1 2 Using Threat Models for Security Testing 11 3 Finding Entry

More information

MODERN MULTITHREADING

MODERN MULTITHREADING MODERN MULTITHREADING Implementing, Testing, and Debugging Multithreaded Java and C++/Pthreads/Win32 Programs RICHARD H. CARVER KUO-CHUNG TAI A JOHN WILEY & SONS, INC., PUBLICATION MODERN MULTITHREADING

More information

The Root Cause of Unstructured Data Problems is Not What You Think

The Root Cause of Unstructured Data Problems is Not What You Think The Root Cause of Unstructured Data Problems is Not What You Think PRESENTATION TITLE GOES HERE Bruce Thompson, CEO Action Information Systems www.expeditefile.com What is this presentation all about?

More information

MANNING C CONCURRENCY IN ACTION SECOND EDITION

MANNING C CONCURRENCY IN ACTION SECOND EDITION page 1 / 6 page 2 / 6 manning c concurrency in pdf C++ Concurrency in Action, Second Edition is the definitive guide to writing elegant multithreaded applications in C++. Updated for C++ 17, it carefully

More information

Memory Dump Analysis Anthology

Memory Dump Analysis Anthology Memory Dump Analysis Anthology Tables of Contents and Indexes Dmitry Vostokov Software Diagnostics Institute Facebook LinkedIn Twitter 9 About the Author Dmitry Vostokov is an internationally recognized

More information

How to Break Software by James Whittaker

How to Break Software by James Whittaker How to Break Software by James Whittaker CS 470 Practical Guide to Testing Consider the system as a whole and their interactions File System, Operating System API Application Under Test UI Human invokes

More information

Process Dump Analyses

Process Dump Analyses Process Dump Analyses 1 Process Dump Analyses Forensical acquisition and analyses of volatile data Tobias Klein tk@trapkit.de Version 1.0, 2006/07/22. Process Dump Analyses 2 1 Overview There is a general

More information

Alex Ionescu, Chief

Alex Ionescu, Chief Alex Ionescu, Chief Architect @aionescu alex@crowdstrike.com Reverse engineered Windows kernel since 1999 Lead kernel developer for ReactOS Project Interned at Apple for a few years (Core Platform Team)

More information

MASSIVE SCALE USB DEVICE DRIVER FUZZ WITHOUT DEVICE. HC Tencent s XuanwuLab

MASSIVE SCALE USB DEVICE DRIVER FUZZ WITHOUT DEVICE. HC Tencent s XuanwuLab MASSIVE SCALE USB DEVICE DRIVER FUZZ WITHOUT DEVICE HC Ma @ Tencent s XuanwuLab whoami Security Researcher@ Used to doing Chemistry; Interested in: Console Hacking; Embedded Device Security; Firmware Reverse

More information

ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE

ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE Most application performance problems surface during peak loads. Often times, these problems are time and resource intensive,

More information

McAfee Endpoint Security

McAfee Endpoint Security Release Notes 10.5.3 Contents About this release What's new Resolved issues Installation information Known issues Getting product information by email Where to find product documentation About this release

More information

Buffer Overflow Defenses

Buffer Overflow Defenses Buffer Overflow Defenses Some examples, pros, and cons of various defenses against buffer overflows. Caveats: 1. Not intended to be a complete list of products that defend against buffer overflows. 2.

More information

Problem System administration tasks on a VM from the outside, e.g., issue administrative commands such as hostname and rmmod. One step ahead tradition

Problem System administration tasks on a VM from the outside, e.g., issue administrative commands such as hostname and rmmod. One step ahead tradition EXTERIOR: Using a Dual-VM Based External Shell for Guest-OS Introspection, Configuration, and Recovery ACM VEE 13 Problem System administration tasks on a VM from the outside, e.g., issue administrative

More information

embos Real-Time Operating System embos plug-in for IAR C-Spy Debugger Document: UM01025 Software Version: 3.1 Revision: 0 Date: May 3, 2018

embos Real-Time Operating System embos plug-in for IAR C-Spy Debugger Document: UM01025 Software Version: 3.1 Revision: 0 Date: May 3, 2018 embos Real-Time Operating System Document: UM01025 Software Version: 3.1 Revision: 0 Date: May 3, 2018 A product of SEGGER Microcontroller GmbH www.segger.com 2 Disclaimer Specifications written in this

More information

Confinement (Running Untrusted Programs)

Confinement (Running Untrusted Programs) Confinement (Running Untrusted Programs) Chester Rebeiro Indian Institute of Technology Madras Untrusted Programs Untrusted Application Entire Application untrusted Part of application untrusted Modules

More information

CPS 310 second midterm exam, 11/6/2013

CPS 310 second midterm exam, 11/6/2013 CPS 310 second midterm exam, 11/6/2013 Your name please: Part 1. Sleeping late (80 points) / 200 The "missed wakeup problem occurs when a thread calls an internal sleep() primitive to block, and another

More information

CSCE : Computer Systems Homework #1 Part 3 (50 pts) Due date: 2/21/19

CSCE : Computer Systems Homework #1 Part 3 (50 pts) Due date: 2/21/19 CSCE 313-200: Computer Systems Homework #1 Part 3 (50 pts) Due date: 2/21/19 1. Problem Description In this part, you will multi-thread the previous version of the homework and analyze search results by

More information

Eliminate Threading Errors to Improve Program Stability

Eliminate Threading Errors to Improve Program Stability Eliminate Threading Errors to Improve Program Stability This guide will illustrate how the thread checking capabilities in Parallel Studio can be used to find crucial threading defects early in the development

More information

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft

More information

Oracle Service Cloud. Release 18D. What s New

Oracle Service Cloud. Release 18D. What s New Oracle Service Cloud Release 18D What s New TABLE OF CONTENTS Revision History 3 Overview 3 Feature Summary 3 Agent Browser Channels 4 Chat Transfer Enhancements 4 Agent Browser Workspaces 5 Link and Unlink

More information

52 Remote Target. Simulation. Chapter

52 Remote Target. Simulation. Chapter Chapter 52 Remote Target Simulation This chapter describes how to run a simulator on a target and connect it to the SDL simulator interface (SimUI) on the host via TCP/IP communication. July 2003 Telelogic

More information

NEC Express5800 Series

NEC Express5800 Series NEC Express5800 Series NEC Express5800/120Rf-1,120Rh-2 Operation Manual For Microsoft Windows Server 2003, Standard x64 Edition / Microsoft Windows Server 2003, Enterprise x64 Edition Note: Microsoft and

More information

embos Real-Time Operating System embos plug-in for IAR C-Spy Debugger Document: UM01025 Software Version: 3.0 Revision: 0 Date: September 18, 2017

embos Real-Time Operating System embos plug-in for IAR C-Spy Debugger Document: UM01025 Software Version: 3.0 Revision: 0 Date: September 18, 2017 embos Real-Time Operating System embos plug-in for IAR C-Spy Debugger Document: UM01025 Software Version: 3.0 Revision: 0 Date: September 18, 2017 A product of SEGGER Microcontroller GmbH & Co. KG www.segger.com

More information

Salesforce Classic Mobile User Guide for Android

Salesforce Classic Mobile User Guide for Android Salesforce Classic Mobile User Guide for Android Version 41.0, Winter 18 @salesforcedocs Last updated: November 21, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

Pre- and post- CS protocols. CS 361 Concurrent programming Drexel University Fall 2004 Lecture 7. Other requirements for a mutual exclusion algorithm

Pre- and post- CS protocols. CS 361 Concurrent programming Drexel University Fall 2004 Lecture 7. Other requirements for a mutual exclusion algorithm CS 361 Concurrent programming Drexel University Fall 2004 Lecture 7 Bruce Char and Vera Zaychik. All rights reserved by the author. Permission is given to students enrolled in CS361 Fall 2004 to reproduce

More information

Announcement. Exercise #2 will be out today. Due date is next Monday

Announcement. Exercise #2 will be out today. Due date is next Monday Announcement Exercise #2 will be out today Due date is next Monday Major OS Developments 2 Evolution of Operating Systems Generations include: Serial Processing Simple Batch Systems Multiprogrammed Batch

More information

Oracle Developer Studio 12.6

Oracle Developer Studio 12.6 Oracle Developer Studio 12.6 Oracle Developer Studio is the #1 development environment for building C, C++, Fortran and Java applications for Oracle Solaris and Linux operating systems running on premises

More information

Chapter 2: System Structures. Operating System Concepts 9 th Edition

Chapter 2: System Structures. Operating System Concepts 9 th Edition Chapter 2: System Structures Silberschatz, Galvin and Gagne 2013 Chapter 2: System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs

More information

Part IV: Connecting Your Apps

Part IV: Connecting Your Apps Contents at a Glance Introduction... 1 Part I: Getting Started with ios Programming... 5 Chapter 1: Entering Mobile Application Development...7 Chapter 2: Object-Oriented Design Principles...25 Chapter

More information

Mandarin Oasis TM Library Automation System

Mandarin Oasis TM Library Automation System Mandarin Oasis TM Library Automation System Daily Use Handbook This handbook explains routine library tasks using Mandarin Oasis. It is designed to supplement Oasis training by providing simple, step-by-step

More information

Sauer-Danfoss PLUS+1 GUIDE Software Version Release Notes

Sauer-Danfoss PLUS+1 GUIDE Software Version Release Notes Sauer-Danfoss PLUS+1 GUIDE Software Version 6.0.8 Release Notes This file contains important supplementary and late-breaking information that may not appear in the main product documentation. We recommend

More information