skip to main content
DOE Patents title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Method for instruction sequence execution analysis and visualization

Abstract

Various technologies pertaining to computer-executable instruction sequence forensics are described herein. In a general embodiment, an application development framework supports a function library that includes a plurality of recording functions. Calls to these functions are inserted into source code or bytecode of the computer-executable instruction sequence. The source code is then compiled, resulting in formation of instrumented machine code of the computer-executable instruction sequence. Alternately, the runtime environment interprets instrumented bytecode for the instruction sequence. A processor executes the machine code, and the called functions cause the processor to generate forensic data pertaining to portions of the computer-executable instruction sequence that correspond to locations in the source code where the calls were inserted. An execution instance of the computer-executable instruction sequence is visualized based upon the forensic data.

Inventors:
; ; ; ; ; ; ; ; ; ;
Issue Date:
Research Org.:
Sandia National Laboratories (SNL), Albuquerque, NM, and Livermore, CA (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1478644
Patent Number(s):
10073764
Application Number:
14/812,842
Assignee:
National Technology & Engineering Solutions of Sandia, LLC (Albuquerque, NM)
Patent Classifications (CPCs):
G - PHYSICS G06 - COMPUTING G06F - ELECTRIC DIGITAL DATA PROCESSING
DOE Contract Number:  
AC04-94AL85000
Resource Type:
Patent
Resource Relation:
Patent File Date: 2015 Jul 29
Country of Publication:
United States
Language:
English

Citation Formats

Sundermier, Amy, Arpin, Bettina K., Karmol, David, Ray, Lawrence P., Munoz, Kenneth Michael, Lawry, William, Coram, Jamie L., Artale, Thomas Anthony, DeMoss, Patrick, Nunno, Lucas Leighton, and Easter, Aaron. Method for instruction sequence execution analysis and visualization. United States: N. p., 2018. Web.
Sundermier, Amy, Arpin, Bettina K., Karmol, David, Ray, Lawrence P., Munoz, Kenneth Michael, Lawry, William, Coram, Jamie L., Artale, Thomas Anthony, DeMoss, Patrick, Nunno, Lucas Leighton, & Easter, Aaron. Method for instruction sequence execution analysis and visualization. United States.
Sundermier, Amy, Arpin, Bettina K., Karmol, David, Ray, Lawrence P., Munoz, Kenneth Michael, Lawry, William, Coram, Jamie L., Artale, Thomas Anthony, DeMoss, Patrick, Nunno, Lucas Leighton, and Easter, Aaron. Tue . "Method for instruction sequence execution analysis and visualization". United States. https://www.osti.gov/servlets/purl/1478644.
@article{osti_1478644,
title = {Method for instruction sequence execution analysis and visualization},
author = {Sundermier, Amy and Arpin, Bettina K. and Karmol, David and Ray, Lawrence P. and Munoz, Kenneth Michael and Lawry, William and Coram, Jamie L. and Artale, Thomas Anthony and DeMoss, Patrick and Nunno, Lucas Leighton and Easter, Aaron},
abstractNote = {Various technologies pertaining to computer-executable instruction sequence forensics are described herein. In a general embodiment, an application development framework supports a function library that includes a plurality of recording functions. Calls to these functions are inserted into source code or bytecode of the computer-executable instruction sequence. The source code is then compiled, resulting in formation of instrumented machine code of the computer-executable instruction sequence. Alternately, the runtime environment interprets instrumented bytecode for the instruction sequence. A processor executes the machine code, and the called functions cause the processor to generate forensic data pertaining to portions of the computer-executable instruction sequence that correspond to locations in the source code where the calls were inserted. An execution instance of the computer-executable instruction sequence is visualized based upon the forensic data.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2018},
month = {9}
}

Patent:

Save / Share:

Works referenced in this record:

MosaiCode: Visualizing large scale software: A tool demonstration
conference, September 2011


Visualization and Analysis of Parallel Dataflow Execution with Smart Traces
conference, August 2014


SYNCTRACE: Visual thread-interplay analysis
conference, September 2013


Algorithm explorer: visualizing algorithms in a 3D multimedia environment
conference, January 2007


Exploiting UML dynamic object modeling for the visualization of C++ programs
conference, January 2005


Visualizing Multiple Program Executions to Assist Behavior Verification
conference, July 2009

  • Zhao, Chunying; Zhang, Kang; Hao, Jie
  • 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement (SSIRI)
  • https://doi.org/10.1109/SSIRI.2009.26

Operation behavior modeling using relation identification and visualization algorithms
conference, August 2013


Visualization of exception handling constructs to support program understanding
conference, January 2008