Research Article

BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel

Table 2

Other analysis results by the second specific analysis approach.

ProgramNumber of EPT violations (million)Proportion of EPT violations in all memory operations (%)Number of context switches per violationExecution time of PM (s)

Certutil2.61.41.2310.5
OpenSSL30.516.60.349.9
7-Zip30442.20.4213.1
FFmpeg21.213.80.7315.3
WinRAR123.161.30.269.6