Content deleted Content added
Updated stable version |
Changed heading to make sense |
||
Line 35:
* Pin itself comes with many example tools that make use of its abilities. These tools are licensed under a BSD-like license.
== Uses ==
=== Uses as a Defence Mechanism === Some scholars{{who|date=February 2016}} think that one can use Pin tool or binary instrumentation techniques to detect malware. Unlike traditional antiviruses where scanning files is used to detect viruses, one can use tools like Pin tool to scan program's resources to detect abnormalities; thus detect malware.
|