Transforming and manipulating program object code

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

395704, 395707, G06F 945

Patent

active

060212721

ABSTRACT:
A method and system for transforming and manipulating program object code. A set of program object code is transformed into a form in which it may be readily manipulated, preferably a form which is independent of both the processor and the operating system with which the object code will execute. The transformed object code is manipulated, preferably to add error-checking instructions, but possibly to add other functions or to alter the functions of the object code. The manipulated code is then reverse-transformed to program object code of the same type as the original object code.

REFERENCES:
patent: 4694420 (1987-09-01), Pettet et al.
patent: 5193180 (1993-03-01), Hastings
patent: 5335344 (1994-08-01), Hastings
patent: 5450575 (1995-09-01), Sites
patent: 5539907 (1996-07-01), Srivastava et al.
patent: 5590331 (1996-12-01), Lewis et al.
Wall, D., "Systems for Late Code Modification," WRL Technical Note TN-19, Western Research Laboratory, Digital Equipment Corporation, Palo Alto, CA; Jun. 1991.
Wall, D., "Global Register Allocation at Link Time," WRL Research Repot 86/3, Western Research Laboratory, Digital Equipment Corporation, Palo Alto, CA; Oct. 28, 1986.
Wall, D., "Register Windows vs. Register Allocation," Proc. Sigplan '88 Conference on Programming Language Design and Implementation, Jun. 1988.
Wall, D., "Link-Time Code Modification," WRL Research Report 89/17, Western Research Laboratory, Digital Equipment Corporation, Palo Alto, CA; Sep. 1989.
Wolf, et al., "Portable Compiler Eases Problems of Software Migration," Computer Design, vol. 23, No. 13, (Littleton, MA), Nov. 1984, pp. 147-153.
Zelkowitz, et al., "Error Checking with Pointer Variables," Proceedings of the Association for Computing Machinery National Conference, pp. 391-395; 1976.
Austin, et al. "Efficient Detection of All Pointer and Array Access Errors," ACM Sigplan Notices, vol. 29, No. 6 (Jun. 1, 1994) pp. 290-301.
Cruess, M., "Memory management chip for 68020 translates addresses in less than a clock cycle," Electronic Design. vol. 34, No. 11 (May 1986), pp. 151-154, 156, 158, 160-161.
Wahbe, et al., "Practical Data Breakpoints: Design and Implementation," ACM Sigplan Notices, vol. 28, No. 6 (Jun. 1, 1993), pp. 1-12.
Wolf, et al., "Portable Compiler Eases Problems of Software Migration," Computer Design, vol. 23, No. 13 (Nov. 1984), pp. 147-153.
Austin, et al., "Efficient Detection of All Pointer and Array Access Errors", Jun. 29, 1994, 8398 ACM Sigplan Notices, No. 6, pp. 290-301.
Cruess, Michael W., "Memory Management Chip For 68020 Translates Addresses In Less Than A Clock Cycle", May 15, 1986, 2328 Electronic Design, No. 11.
Wahbe, et al., "Practical Data Breakpoints: Design and Implementation", Jun. 29, 1993, 8398 ACM Sigplan Notices, No. 6, pp. 1-12.
"System V Application Binary Interface", UNIX Systems Lab. Inc. 1992 (pp. 4-1 to 4-33).
Ball, et al., "Optimally Profiling and Tracing Programs," Technical Report #1031, Revision 1, Computer Sciences Department, University of Wisconsin-Madison; Sep. 6, 1991.
Bartlett, J., "Compacting Garbage Collection with Ambiguous Roots," Western Research Laboratory, Ditigal Equipment Corporation, Palo Alto, CA; Technical Report; Feb. 1988.
Borg, et al., "Long Address Traces form RISC Machines: Generation and Analysis," WRL Research Report 89/14, Western Research Laboratory, Digital Equipment Corporation, Palo Alto, CA; Sep. 1989.
Charlton, et al., "A Microprogram Meta-Disassembler," Microprocessing and Microprogramming, vol. 22, No. 4, Oct. 1988, pp. 255-262.
Curry, T., "Profiling and Tracing Dynamic Library Usage Via Interposition," 1994 Summer USENIX Proceedings, Boston, MA, pp. 267-278, Jun. 6-10, 1994.
Feustel, E., "On the Advantages of Tagged Architecture," IEEE Transactions on Computers, vol. C-22, No. 7, pp. 644-656; Jul. 1973.
Goldberg, et al., "MTOOL: A Method for Detecting Memory Bottlenecks," WRL Technical Note TN-17, Western Research Laboratory, Digital Equipment Corporation, Palo Alto, CA; Dec. 1990.
Hastings, et al., "Purify: Fast Detection of Memory Leaks and Access Errors," USENIX Transactions, Winter 1992, pp. 125-136.
Huang, J.C., "Detection of Data Flow Anomaly Through Program Instrumentation," IEEE Transactions of Software Engineering, vol. SE-5, No. 3, pp. 226-236; May 1979.
Kaufer, et al., "Saber-C: An Interpreter-based Programming Environment for the C Language," 1988 Summer USENIX Proceedings, San Francisco, CA, pp. 161-171; Jun. 20-24, 1988.
Kempton, et al., "Run-time Detection of Undefined Variables Considered Essential," Software--Practice and Experience, vol. 20, No. 4, pp. 391-402, Apr. 1990.
Kessler, P., "Fast Breakpoints: Design and Implementation," Proceedings of the ACM Sigplan '90 Conference on Programming Language Design and Implementation, White Plains, NY, pp. 78-84; Jun. 20-22, 1990.
Larus, et al., "Rewriting Executable Files to Measure Program Behavior," Technical Report 1083, University of Wisconsin Computer Sciences Department; Mar. 25, 1992.
Merilatt, R., "C Dynamic Memory Use: Finding and exterminating C's dynamic memory errors," Dr. Dobb's Journal, pp. 62-67, 125; Aug. 1989.
Sato, et al., "Run-Time Checking in LISP by Integrating Memory Addressing and Range Checking," Research Development Corportation of Japan, Proc. Association for Computing Machinery, pp. 290-297; 1989.
Srivastava, et al., "A Practical System for Intermodule Code Optimization at Link-Time," WRL Research Report 92/6. Western Research Laboratory, Digital Equipment Corporation, Palo Alto, CA; Dec. 1992.
Steffan, J., "Adding Run-Time Checking to the Portable C Compiler," Software-Practice and Experience, vol. 22, No. 4, pp. 305-316; Apr. 1992.
Wall, D., "Regarding the Pure Software Patent," Western Research Laboratory, Digital Equipment Corporation, Palo Alto, CA; Dec. 21, 1993.
Wall, et al., "The Mahler Experience: Using an Intermediate Language as the Machine Description," Proc. 2nd Symposium on Architectural Support for Programming Languages and Operating Systems, Association for Computing Machinery, Inc.; 1987.
Wall, D., "Systems for Late Code Modification," WRL Research Report 92/3, Wester Research Laboratory, Digital Equipment Corporation, Palo Alto, CA; May 1992.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Transforming and manipulating program object code does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Transforming and manipulating program object code, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Transforming and manipulating program object code will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-944655

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.