Automatic injection of agents into processes executing statically linked binaries

    公开(公告)号:US12141049B2

    公开(公告)日:2024-11-12

    申请号:US18533483

    申请日:2023-12-08

    Applicant: Dynatrace LLC

    Abstract: A system and method is disclosed for injecting in-process agents into processes executing self-contained, statically linked binaries that do not interact with a dynamic loader mechanism that identifies and resolves required libraries at run time. System calls directed to the execution of binaries in processes are intercepted and the targeted binary is analyzed to determine whether it is statically linked. In case a statically linked binary is identified, a proxy launcher process is started instead of the binary which starts the original binary as traceable child process. After the child process has loaded the original binary into its process memory, the memory image of the child process is copied to the launcher process and the child process is terminated. An agent is loaded into the launcher process to instruments the copied memory image. After the instrumentation is finished, the original start conditions for the statically linked binary are reconstructed and the entry function of the instrumented statically linked binary is called to execute the binary.

    Automatic Injection Of Agents Into Processes Executing Statically Linked Binaries

    公开(公告)号:US20240111659A1

    公开(公告)日:2024-04-04

    申请号:US18533483

    申请日:2023-12-08

    Applicant: Dynatrace LLC

    CPC classification number: G06F11/3644 G06F9/44521

    Abstract: A system and method is disclosed for injecting in-process agents into processes executing self-contained, statically linked binaries that do not interact with a dynamic loader mechanism that identifies and resolves required libraries at run time. System calls directed to the execution of binaries in processes are intercepted and the targeted binary is analyzed to determine whether it is statically linked. In case a statically linked binary is identified, a proxy launcher process is started instead of the binary which starts the original binary as traceable child process. After the child process has loaded the original binary into its process memory, the memory image of the child process is copied to the launcher process and the child process is terminated. An agent is loaded into the launcher process to instruments the copied memory image. After the instrumentation is finished, the original start conditions for the statically linked binary are reconstructed and the entry function of the instrumented statically linked binary is called to execute the binary.

    Automatic injection of agents into processes executing statically linked binaries

    公开(公告)号:US11892939B2

    公开(公告)日:2024-02-06

    申请号:US17194861

    申请日:2021-03-08

    Applicant: Dynatrace LLC

    CPC classification number: G06F11/3644 G06F9/44521

    Abstract: A system and method is disclosed for injecting in-process agents into processes executing self-contained, statically linked binaries that do not interact with a dynamic loader mechanism that identifies and resolves required libraries at run time. System calls directed to the execution of binaries in processes are intercepted and the targeted binary is analyzed to determine whether it is statically linked. In case a statically linked binary is identified, a proxy launcher process is started instead of the binary which starts the original binary as traceable child process. After the child process has loaded the original binary into its process memory, the memory image of the child process is copied to the launcher process and the child process is terminated. An agent is loaded into the launcher process to instruments the copied memory image. After the instrumentation is finished, the original start conditions for the statically linked binary are reconstructed and the entry function of the instrumented statically linked binary is called to execute the binary.

Patent Agency Ranking