From: Julian Seward Date: Thu, 22 Nov 2007 01:07:57 +0000 (+0000) Subject: Add a page listing papers etc about Valgrind. Cut-down version of X-Git-Tag: svn/VALGRIND_3_3_0~93 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=595181679aa33e718c519c9f34a0008eb83a220a;p=thirdparty%2Fvalgrind.git Add a page listing papers etc about Valgrind. Cut-down version of http://valgrind.org/docs/pubs.html. Could do with improved formatting, but is at least a start. git-svn-id: svn://svn.valgrind.org/valgrind/trunk@7198 --- diff --git a/docs/xml/new-tech-docs.xml b/docs/xml/new-tech-docs.xml new file mode 100644 index 0000000000..3cc9ac6b30 --- /dev/null +++ b/docs/xml/new-tech-docs.xml @@ -0,0 +1,64 @@ + + + + + + +The Design and Implementation of Valgrind + + +A number of academic publications nicely describe many aspects +of Valgrind's design and implementation. Online copies of all of +them, and others, are available at +http://valgrind.org/docs/pubs.html. + +A good top-level overview of Valgrind is given in: + + +"Valgrind: A Framework for Heavyweight Dynamic Binary +Instrumentation." Nicholas Nethercote and Julian Seward. Proceedings +of ACM SIGPLAN 2007 Conference on Programming Language Design and +Implementation (PLDI 2007), San Diego, California, USA, June 2007. +This paper describes how Valgrind works, and how it differs from other +DBI frameworks such as Pin and DynamoRIO. + + +The following two papers together give a comprehensive +description of how Memcheck works: + +"Using Valgrind to detect undefined value errors with +bit-precision." Julian Seward and Nicholas Nethercote. Proceedings +of the USENIX'05 Annual Technical Conference, Anaheim, California, +USA, April 2005. This paper describes in detail how Memcheck's +undefined value error detection (a.k.a. V bits) works. + +"How to Shadow Every Byte of Memory Used by a Program." +Nicholas Nethercote and Julian Seward. Proceedings of the Third +International ACM SIGPLAN/SIGOPS Conference on Virtual Execution +Environments (VEE 2007), San Diego, California, USA, June 2007. This +paper describes in detail how Memcheck's shadow memory is implemented, +and compares it to other alternative approaches. + + +The following paper describes Callgrind: + +"A Tool Suite for Simulation Based Analysis of Memory Access +Behavior." Josef Weidendorfer, Markus Kowarschik and Carsten +Trinitis. Proceedings of the 4th International Conference on +Computational Science (ICCS 2004), Krakow, Poland, June 2004. This +paper describes Callgrind. + +The following dissertation describes Valgrind in some detail +(some of these details are now out-of-date) as well as Cachegrind, +Annelid and Redux. It also covers some underlying theory about +dynamic binary analysis in general and what all these tools have in +common: + +"Dynamic Binary Analysis and Instrumentation." Nicholas +Nethercote. PhD Dissertation, University of Cambridge, November +2004. + + +