|Developer(s)||Authors of DynamoRIO|
|Stable release||4.0.1 / January 7, 2013|
|Operating system||Linux, Windows|
|Type||Instrumentation framework, Profiler|
DynamoRIO is a BSD licensed dynamic binary instrumentation framework for the development of dynamic program analysis tools. DynamoRIO targets user space applications under the Linux and Windows operating systems running on the IA-32 and x86-64 instruction set architectures.
DynamoRIO was originally created as a dynamic binary optimization system but has since been used for security, debugging, and analysis tools. DynamoRIO originated in a collaboration between Hewlett-Packard's Dynamo optimization system and the Runtime Introspection and Optimization (RIO) research group  at MIT; hence the combined name "DynamoRIO". It was first released publicly as a proprietary binary toolkit in June 2002 and was later open-sourced with a BSD license in January 2009.
DynamoRIO is a process virtual machine that redirects a program's execution from its original binary code to a copy of that code. Instrumentation that carries out the actions of the desired tool are then added to this copy. No changes are made to the original program, which does not need to be specially prepared in any way. DynamoRIO operates completely at run time and handles legacy code, dynamically loaded libraries, dynamically generated code, and self-modifying code.
DynamoRIO's API abstracts away the details of the virtualization process and focuses on monitoring or modifying the dynamic code stream of the program. A tool can insert trampolines into the program that invoke tool actions at specific program points. A tool can also insert instrumentation at the assembly language level, which provides fine-grained control over tool actions and tool performance. DynamoRIO supports adaptive optimization and adaptive instrumentation by allowing a tool to remove or modify its instrumentation at any point throughout the execution of the target program.
DynamoRIO invokes tool-registered callbacks at a number of common program event points, such as thread creation, library loading, system calls, signals, or exceptions. Its API also allows inspecting the program's libraries and address space in addition to its code.
DynamoRIO's API and event callbacks are designed to be cross-platform, enabling the same tool code to operate on both Windows and Linux and on both IA-32 and x86-64. DynamoRIO ensures tool transparency by isolating the tool's resources, such as its stack, memory, and file accesses, from the program upon which the tool is operating.
DynamoRIO contains libraries that extend its API to provide symbol table access, function wrapping and replacing, and memory address tracing utilities.
Applying DynamoRIO to the security field resulted in a technique called program shepherding. The program shepherding instrumentation monitors the origin of each program instruction and the control flow between instructions in order to prevent a security exploit from taking control of the program. In 2003, program shepherding was commercialized as the brand-named Memory Firewall host intrusion prevention software in a startup company called Determina. Determina was acquired by VMware in August 2007.
Dr. Memory is an open-source memory debugging tool built on DynamoRIO and released under an LGPL license. Dr. Memory monitors memory allocations and memory accesses using shadow memory. It detects memory-related programming errors such as accesses of uninitialized memory, accesses to freed memory, heap overflow and underflow, and memory leaks. Its feature set is similar to that of the Valgrind-based Memcheck tool, though it operates on Windows as well as Linux and is twice as fast as Memcheck.
- The RIO Project: Runtime Introspection and Optimization
- Transparent Dynamic Instrumentation, Figure 4
- An Infrastructure for Adaptive Dynamic Optimization
- TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting
- PiPA: Pipelined Profiling and Analysis on Multi-Core Systems
- Secure Execution Via Program Shepherding
- VMware acquires HIPS provider Determina
- Dr. Memory: Memory Debugger for Windows and Linux
- Practical Memory Checking with Dr. Memory
- Bruening, Derek (2004). Efficient, Transparent, and Comprehensive Runtime Code Manipulation (Ph.D.). Massachusetts Institute of Technology.
- Derek Bruening, Timothy Garnett, and Saman Amarasinghe (March 2003). "An Infrastructure for Adaptive Dynamic Optimization". Proceedings of the International Symposium on Code Generation and Optimization. San Francisco, California, USA. pp. 265–275.