"Classical debuggers make use of an interface provided by the
operating system in order taccess the memory of programs while they execute. As this model is dominating in the industry and the community, we show that our novel embedded architecture is more adapted when debuggee systems are hostile and protected at the operating system level.
This alternative modelization is alsmore performant as the debugger executes from inside the debuggee program and can read the memory of the host process directly. We give detailed information about how tkeep memory unintrusiveness using a new technique called allocation proxying.
We reveal how we developed the organization of our multi-
architecture framework and its multiple modules sthat they allow for graph-based binary code analysis, compositional Fingerprinting, program instrumentation, real-time tracing, multithread debugging and general hooking of systems. Finally we reveal the re?ective essence of our framework : our analyzers are made aware of their own internal structures using concepts of aspect oriented programming, embedded in a weakly
typed language dedicated treverse engineering. "