Error Recovery Script of Immunity Debugger for C# .NET Applications


Rupali Shinde, Min Choi, Su-Hyun Lee, Journal of Information Processing Systems Vol. 15, No. 6, pp. 1438-1448, Dec. 2019  

10.3745/JIPS.04.0151
Keywords: debugger, Reverse engineering, VED
Fulltext:

Abstract

We present a new technique, called VED (very effective debugging), for detecting and correcting division by zero errors for all types of .NET application. We use applications written in C# because C# applications are distributed through the internet and its executable format is used extensively. A tool called Immunity Debugger is used to reverse engineer executable code to get binaries of source code. With this technique, we demonstrate integer division by zero errors, the location of the error causing assembly language code, as well as error recovery done according to user preference. This technique can be extended to work for other programming languages in addition to C#. VED can work on different platforms such as Linux. This technique is simple to implement and economical because all the software used here are open source. Our aims are to simplify the maintenance process and to reduce the cost of the software development life cycle.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Rupali Shinde, Min Choi, & Su-Hyun Lee (2019). Error Recovery Script of Immunity Debugger for C# .NET Applications. Journal of Information Processing Systems, 15(6), 1438-1448. DOI: 10.3745/JIPS.04.0151.

[IEEE Style]
R. Shinde, M. Choi and S. Lee, "Error Recovery Script of Immunity Debugger for C# .NET Applications," Journal of Information Processing Systems, vol. 15, no. 6, pp. 1438-1448, 2019. DOI: 10.3745/JIPS.04.0151.

[ACM Style]
Rupali Shinde, Min Choi, and Su-Hyun Lee. 2019. Error Recovery Script of Immunity Debugger for C# .NET Applications. Journal of Information Processing Systems, 15, 6, (2019), 1438-1448. DOI: 10.3745/JIPS.04.0151.