
Follow the following commands: cd source/tools/ManualExamples/ To demonstrate that our system works correctly, let’s start with building few example tools delivered with the source. Inside of it, we will see a pin executive which is our tool. tar.gz of Intel pin 3.4 from the above link. I have used Linux distribution (Ubuntu) with Intel x86-64 architecture to install Intel pin 3.4 (). The manual will be available here. Here I will describe how I get familiar with this tool. We can collect memory information, register value, which instruction is executing and so on. We can instrument the binary at runtime and collect information about execution. Intel pin tool is a great dynamic analysis tool. The only limitation is it is only usable for Intel architecture. It’s developed by Intel research team and well documented for reference. Today I am going to discuss how I learned to use Intel Pin tool. Most cases the technology is also a prototype from other researcher and presumably unstable, have not enough documentation and very limited feature. But on another hand, it is also complicated to work on others work. It cuts the development time to start from scratch. Researchers greatly depend on existing technology and software to implement their prototype. A researcher has to prove the proposed system is legitimate. Especially when it’s about security, its a must one. The most difficult part of doing research is prototyping.
