![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course aims to teach learners how to utilize hardware features for increased debugging transparency. The learning outcomes include understanding the limitations of traditional debugging methods, implementing step-by-step execution, evaluating transparency and performance, and analyzing debugging registers. The course teaches skills such as utilizing System Management Mode in the x86 architecture, implementing debugging functions like register/memory accesses and breakpoints, and conducting performance analysis. The teaching method involves a presentation by Fengwei Zhang at the 2015 IEEE Symposium on Security & Privacy. The intended audience for this course is individuals interested in advanced malware analysis, debugging frameworks, and cybersecurity.
Syllabus
Introduction
Overview
Motivation
Limitations
Description
Traditional Debugging
Stepbystep Execution
Evaluation Results
Transparency Analysis
Performance Analysis
Conclusion
References
Bloopers
Whats the difference between my work and bearbox
Timing issues
Timing information
Overhead
Performance Evaluation
Debugging Register
Taught by
IEEE Symposium on Security and Privacy