Log and Execution Trace Analytics System

Author(s):  
Nazrin Abbasli ◽  
Murat Can Ganiz
Keyword(s):  
2021 ◽  
Vol 206 ◽  
pp. 102630
Author(s):  
Kazumasa Shimari ◽  
Takashi Ishio ◽  
Tetsuya Kanda ◽  
Naoto Ishida ◽  
Katsuro Inoue

Author(s):  
Hasan Abualese ◽  
Putra Sumari ◽  
Thamer Al-Rousan ◽  
Mohammad Rasmi Al-Mousa

2012 ◽  
Vol 56 (3) ◽  
pp. 71 ◽  
Author(s):  
Ábel Hegedüs ◽  
István Ráth ◽  
Dániel Varró

2014 ◽  
Vol 530-531 ◽  
pp. 865-868
Author(s):  
Jin Rong Bai ◽  
Guo Zhong Zou ◽  
Shi Guang Mu

The API calls reflect the functional levels of a program, analysis of the API calls would lead to an understanding of the behavior of the malware. Malware analysis environment has been widely used, but some malware already have the anti-virtual, anti-debugging and anti-tracking ability with the evolution of the malware. These analysis environments use a combination of API hooking and/or API virtualization, which are detectable by malware running at the same privilege level. In this work, we develop the fully automated platform to trace the native API calls based on secondary development of Xen and have obtained the most transparent and similar system to a Windows OS as possible in order to obtain an execution trace of a program as if it was run in an environment with no tracer present. In contrast to other approaches, the hardware-assisted nature of our approach implicitly avoids many shortcomings that arise from incomplete or inaccurate system emulation.


Author(s):  
Manjula Peiris ◽  
James H. Hill

This chapter discusses how to adapt system execution traces to support analysis of software system performance properties, such as end-to-end response time, throughput, and service time. This is important because system execution traces contain complete snapshots of a systems execution—making them useful artifacts for analyzing software system performance properties. Unfortunately, if system execution traces do not contain the required properties, then analysis of performance properties is hard. In this chapter, the authors discuss: (1) what properties are required to analysis performance properties in a system execution trace; (2) different approaches for injecting the required properties into a system execution trace to support performance analysis; and (3) show, by example, the solution for one approach that does not require modifying the original source code of the system that produced the system execution.


2019 ◽  
Vol 37 (6) ◽  
pp. 8397-8415
Author(s):  
Clemente Rubio-Manzano ◽  
Tomás Lermanda Senoceaín ◽  
Claudia Martinez-Araneda ◽  
Christian Vidal-Castro ◽  
Alejandra Segura-Navarrete

Sign in / Sign up

Export Citation Format

Share Document