Research Article
BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel
Table 2
Other analysis results by the second specific analysis approach.
| Program | Number of EPT violations (million) | Proportion of EPT violations in all memory operations (%) | Number of context switches per violation | Execution time of PM (s) |
| Certutil | 2.6 | 1.4 | 1.23 | 10.5 | OpenSSL | 30.5 | 16.6 | 0.34 | 9.9 | 7-Zip | 304 | 42.2 | 0.42 | 13.1 | FFmpeg | 21.2 | 13.8 | 0.73 | 15.3 | WinRAR | 123.1 | 61.3 | 0.26 | 9.6 |
|
|