Uninformed: Informative Information for the Uninformed

Vol 7» 2007.May


This section describes three strategies that can be used to intercept runtime memory accesses. The strategies described herein do not rely on any static binary analysis. Techniques that do make use of static binary analysis are outside of the scope of this paper.