猫的胡须是干什么用的| 狼吞虎咽是什么生肖| 青霉素过敏可以吃什么消炎药| 深明大义是什么意思| 外婆菜是什么| 尿酸高不能吃什么东西| 肚脐左侧按压疼是什么原因| 艾滋病通过什么传播| 十月二十二是什么星座| 肚子胀打嗝是什么原因| 待客是什么意思| biemlfdlkk是什么牌子| 胎儿为什么会喜欢臀位| 粥配什么菜最好吃| 擒贼先擒王是什么生肖| 四川地震前有什么预兆| 明了是什么意思| 什么东西能吃能喝又能坐| 茄子与什么食物相克| 1971年属猪的是什么命| 逍遥丸主要治什么病| 二毛二是什么军衔| 痛风急性期吃什么药| 怀孕初期要注意什么| 血糖高怎么办吃什么好| 李元霸为什么怕罗士信| 移徒什么意思| 夏天吃什么| 太阳病是什么意思| 高铁特等座有什么待遇| 叶倩文属什么生肖| 是的什么意思| sk是什么意思| nbi是什么意思| 1996年什么命| 梦见刨红薯是什么意思| 麻油是什么| 身上长白斑是什么原因造成的| 风凉话是什么意思| 摔纹皮是什么皮| 孙权与孙策是什么关系| 亵玩是什么意思| 25岁今年属什么生肖| 血症是什么病| 唐僧原名叫什么| 特点是什么意思| nh3是什么| 判决书什么时候生效| 刷牙时牙酸是什么原因| 乙型肝炎表面抗原阳性是什么意思| 脾大是什么原因| 孕妇贫血吃什么补血最好| sigma是什么牌子| 白喉是什么病| ab型血和o型血生的孩子是什么血型| 得宫颈癌的前兆是什么| 落井下石什么意思| 人为什么要睡觉| 帽缨是什么意思| 拉肚子吃什么抗生素| 急于求成是什么意思| 九月二十九号是什么星座| 竖心旁的字有什么| 699是什么意思| 人经常放屁是什么原因| 做梦梦到鸡是什么意思| crp高是什么感染| 反流性食管炎是什么病| 氯读什么拼音| 旅行是什么意思| 地球为什么叫地球| 云南白药里的保险子有什么作用| 包拯属什么生肖| 合肥以前叫什么| 女人喜欢什么样的阴茎| 小孩子为什么会得抽动症| 吐信子是什么意思啊| 口舌生疮吃什么药最见效| 梦到墓地什么预兆| 头疼吃什么药| 奶油是什么做的| 猫便秘吃什么最快排便| 无休止是什么意思| 手脚浮肿是什么原因引起的| 吃什么最养胃修复胃| 梦见请别人吃饭是什么意思| 肚子饱胀是什么原因| 月支是什么意思| 蜱虫咬人后有什么症状| 11月5日是什么星座| 智能手环是干什么用的| 胃不消化吃什么药好| 脚旁边骨头突出叫什么| 两性关系是什么意思| 颈椎病头晕吃什么药好| 吃了避孕药不能吃什么东西| 辛辣是什么意思| 缺硒吃什么| 江西有什么特产| 胆囊炎什么症状| 肾虚是什么原因造成的| 宋五行属什么| 六月六是什么节日| 禅宗是什么意思| 鱼疗是什么鱼| 梦见车丢了是什么征兆| 肚子特别疼是什么原因| 银手镯变黑是什么原因| 土茯苓与茯苓有什么区别| 什么叫三焦| 什么是直肠炎| 4月4日是什么星座| 右手发麻是什么原因| 鹌鹑蛋是什么动物的蛋| 艺名是什么意思| 苗侨伟为什么叫三哥| 高血糖吃什么食物好| 什么的莲蓬| 肚子咕噜响是什么原因| 02年属马的是什么命| 四月18号是什么星座的| 宫保鸡丁宫保是指什么| 航班号是什么| 凌晨一点半是什么时辰| 桃花什么生肖| 来月经吃什么| 插科打诨是什么意思| 身心健康是什么意思| 腿抽筋用什么药| 缺如是什么意思| 护士是干什么的| 196是什么意思| 嘴巴干苦是什么原因| 心脏早搏有什么症状| 阳痿挂什么科| 龟苓膏是什么做的| 续弦是什么意思| 肉包子打狗的歇后语是什么| 肝经不通吃什么中成药| 激素6项什么时候查| tc什么意思| 菊花泡水喝有什么好处| 婴儿什么时候可以吃盐| 乳胶是什么意思| 月亮什么时候是圆的| 一直咳嗽是什么原因| 毒唯什么意思| 乳腺结节3类什么意思| 恩爱是什么意思| 锦纹是什么中药| 治愈是什么意思| 刘亦菲为什么不结婚| 唇珠在面相中代表什么| 尿隐血是什么意思| 蒹葭苍苍是什么意思| 血脂高吃什么能降下来| 噗噗是什么意思| 第一胎打掉会有什么影响| 什么是微量元素| 小炒皇是什么菜| 脚踝浮肿是什么原因引起的| 尿淀粉酶高是什么原因| 汤姆福特属于什么档次| 一什么手| 9月13日什么星座| 尿酸高吃什么降的快| 吃芹菜有什么好处| 内痔是什么| 牙疳是什么意思| 睡觉盗汗是什么原因| 知行合一是什么意思| 生育登记有什么用| 大什么什么手| 脾胃虚弱吃什么好| 皮赘是什么| 舌头火辣辣的是什么病| ck医学上是什么意思| 苹果什么时候成熟| 四个一是什么字| 鲁肃的性格特点是什么| 老是腹泻是什么原因导致的| 碘化银什么颜色| 乡长是什么级别| 玥字属于五行属什么| 农历11月11日是什么星座| 贝伐珠单抗是什么药| 斑秃是什么原因引起的| 灵芝有什么作用与功效| 花呗是什么意思| 世界上有什么| 腋下淋巴结挂什么科| 88年属什么的| 万病之源是什么| 北方五行属什么| 受控是什么意思| 肉桂茶是什么茶| 荨麻疹为什么晚上起| 梦见已故长辈什么预兆| 家人是什么意思| 艾灸有什么好处| 容易出汗是什么问题| 孕妇子痫是什么病| 正能量是什么意思| 鸡属于什么类动物| 三点是什么时辰| 什么食物含钙量最高| 激素高是什么原因| 祈是什么意思| 仰仗是什么意思| 小孩割包皮挂什么科| 喘不过气是什么原因| 西红柿生吃有什么好处| 脚面疼是什么原因引起的| 深深是什么意思| 柠檬和什么一起泡减肥| cuff是什么意思| 女人上嘴唇有痣代表什么| 女生喜欢什么姿势| 捞人什么意思| 煮玉米为什么要放盐| 一月七号是什么星座| 细小是什么病什么症状| 土土心念什么| 肌肉型肥胖是什么意思| 什么是二手烟| 分拣员是做什么的| 董字五行属什么| 胆红素阴性是什么意思| 年庚是什么意思| 嗝什么意思| 呈现是什么意思| 为什么会得甲减| 兔子是什么意思| 势利是什么意思| 5到7点是什么时辰| 澄粉是什么粉| 吃什么囊肿会消失| 9月17号是什么星座的| 为什么正骨后几天越来越疼| 骨密度t值是什么意思| 不成功便成仁的仁是什么意思| 肾病有什么症状| 泡温泉穿什么衣服| 水猴子长什么样子| 外阴炎是什么原因引起的| 昙花什么时候开花| 果蝇是什么| 什么饮料好喝又健康| 粘鞋子用什么胶水最好| 支气管舒张试验阳性说明什么| 脊髓炎是什么病| 香菜不能和什么一起吃| k开头的是什么车| 生肖龙和什么生肖最配| 辰砂是什么| 刺梨什么时候成熟| 田此读什么| 虎毒不食子什么意思| 樱花的花语是什么| 琀是什么意思| 宣府是现在的什么地方| 提肛运动有什么好处| 紫丁香什么时候开花| 餐饮sop是什么意思| 百度Jump to content

聊城农业提质的关键之举

From Wikipedia, the free encyclopedia
百度 实践证明,课题制的实施,不仅打破了部门界限、整合了各方资源,也为破解工作难题、推动工作创新发展找到了一条有效途径。

Machine language monitor running on a W65C816S microprocessor, displaying code disassembly and dumps of processor register and memory

In computer programming, machine code is computer code consisting of machine language instructions, which are used to control a computer's central processing unit (CPU). For conventional binary computers, machine code is the binary[nb 1] representation of a computer program that is actually read and interpreted by the computer. A program in machine code consists of a sequence of machine instructions (possibly interspersed with data).[1]

Each machine code instruction causes the CPU to perform a specific task. Examples of such tasks include:

  1. Load a word from memory to a CPU register
  2. Execute an arithmetic logic unit (ALU) operation on one or more registers or memory locations
  3. Jump or skip to an instruction that is not the next one

In general, each architecture family (e.g., x86, ARM) has its own instruction set architecture (ISA), and hence its own specific machine code language. There are exceptions, such as the VAX architecture, which includes optional support of the PDP-11 instruction set; the IA-64 architecture, which includes optional support of the IA-32 instruction set; and the PowerPC 615 microprocessor, which can natively process both PowerPC and x86 instruction sets.

Machine code is a strictly numerical language, and it is the lowest-level interface to the CPU intended for a programmer. Assembly language provides a direct map between the numerical machine code and a human-readable mnemonic. In assembly, numerical machine code opcodes and operands are replaced with mnemonics and labels. For example, the x86 architecture has available the 0x90 opcode; it is represented as NOP in the assembly source code. While it is possible to write programs directly in machine code, managing individual bits and calculating numerical addresses is tedious and error-prone. Therefore, programs are rarely written directly in machine code. However, an existing machine code program may be edited if the assembly source code is not available.

The majority of programs today are written in a high-level language. A high-level program may be translated into machine code by a compiler.

Instruction set

[edit]

Every processor or processor family has its own instruction set. Machine instructions are patterns of bits[nb 2] that specify some particular action.[2] An instruction set is described by its instruction format. Some ways in which instruction formats may differ:[2]

  • all instructions may have the same length or instructions may have different lengths;
  • the number of instructions may be small or large;
  • instructions may or may not align with the architecture's word length.

A processor's instruction set needs to execute the circuits of a computer's digital logic level. At the digital level, the program needs to control the computer's registers, bus, memory, ALU, and other hardware components.[3] To control a computer's architectural features, machine instructions are created. Examples of features that are controlled using machine instructions:

The criteria for instruction formats include:

  • Instructions most commonly used should be shorter than instructions rarely used.[2]
  • The memory transfer rate of the underlying hardware determines the flexibility of the memory fetch instructions.
  • The number of bits in the address field requires special consideration.[7]

Determining the size of the address field is a choice between space and speed.[7] On some computers, the number of bits in the address field may be too small to access all of the physical memory. Also, virtual address space needs to be considered. Another constraint may be a limitation on the size of registers used to construct the address. Whereas a shorter address field allows the instructions to execute more quickly, other physical properties need to be considered when designing the instruction format.

Instructions can be separated into two types: general-purpose and special-purpose. Special-purpose instructions exploit architectural features that are unique to a computer. General-purpose instructions control architectural features common to all computers.[8]

General-purpose instructions control:

  • Data movement from one place to another
  • Monadic operations that have one operand to produce a result
  • Dyadic operations that have two operands to produce a result
  • Comparisons and conditional jumps
  • Procedure calls
  • Loop control
  • Input/output

Assembly languages

[edit]
Translation of assembly language into machine language

A much more human-friendly rendition of machine language, named assembly language, uses mnemonic codes to refer to machine code instructions, rather than using the instructions' numeric values directly, and uses symbolic names to refer to storage locations and sometimes registers.[9] For example, on the Zilog Z80 processor, the machine code 00000101, which causes the CPU to decrement the B general-purpose register, would be represented in assembly language as DEC B.[10]

Examples

[edit]

IBM 709x

[edit]

The IBM 704, 709, 704x and 709x store one instruction in each instruction word; IBM numbers the bit from the left as S, 1, ..., 35. Most instructions have one of two formats:

Generic
S,1-11
12-13 Flag, ignored in some instructions
14-17 unused
18-20 Tag
21-35 Y
Index register control, other than TSX
S,1-2 Opcode
3-17 Decrement
18-20 Tag
21-35 Y

For all but the IBM 7094 and 7094 II, there are three index registers designated A, B and C; indexing with multiple 1 bits in the tag subtracts the logical or of the selected index registers and loading with multiple 1 bits in the tag loads all of the selected index registers. The 7094 and 7094 II have seven index registers, but when they are powered on they are in multiple tag mode, in which they use only the three of the index registers in a fashion compatible with earlier machines, and require a Leave Multiple Tag Mode (LMTM) instruction in order to access the other four index registers.

The effective address is normally Y-C(T), where C(T) is either 0 for a tag of 0, the logical or of the selected index registers in multiple tag mode or the selected index register if not in multiple tag mode. However, the effective address for index register control instructions is just Y.

A flag with both bits 1 selects indirect addressing; the indirect address word has both a tag and a Y field.

In addition to transfer (branch) instructions, these machines have skip instruction that conditionally skip one or two words, e.g., Compare Accumulator with Storage (CAS) does a three way compare and conditionally skips to NSI, NSI+1 or NSI+2, depending on the result.

MIPS

[edit]

The MIPS architecture provides a specific example for a machine code whose instructions are always 32 bits long.[11]:?299? The general type of instruction is given by the op (operation) field, the highest 6 bits. J-type (jump) and I-type (immediate) instructions are fully specified by op. R-type (register) instructions include an additional field funct to determine the exact operation. The fields used in these types are:

   6      5     5     5     5      6 bits
[  op  |  rs |  rt |  rd |shamt| funct]  R-type
[  op  |  rs |  rt | address/immediate]  I-type
[  op  |        target address        ]  J-type

rs, rt, and rd indicate register operands; shamt gives a shift amount; and the address or immediate fields contain an operand directly.[11]:?299–301?

For example, adding the registers 1 and 2 and placing the result in register 6 is encoded:[11]:?554?

[  op  |  rs |  rt |  rd |shamt| funct]
    0     1     2     6     0     32     decimal
 000000 00001 00010 00110 00000 100000   binary

Load a value into register 8, taken from the memory cell 68 cells after the location listed in register 3:[11]:?552?

[  op  |  rs |  rt | address/immediate]
   35     3     8           68           decimal
 100011 00011 01000 00000 00001 000100   binary

Jumping to the address 1024:[11]:?552?

[  op  |        target address        ]
    2                 1024               decimal
 000010 00000 00000 00000 10000 000000   binary

Overlapping instructions

[edit]

On processor architectures with variable-length instruction sets[12] (such as Intel's x86 processor family) it is, within the limits of the control-flow resynchronizing phenomenon known as the Kruskal count,[13][12][14][15][16] sometimes possible through opcode-level programming to deliberately arrange the resulting code so that two code paths share a common fragment of opcode sequences.[nb 3] These are called overlapping instructions, overlapping opcodes, overlapping code, overlapped code, instruction scission, or jump into the middle of an instruction.[17][18][19]

In the 1970s and 1980s, overlapping instructions were sometimes used to preserve memory space. One example were in the implementation of error tables in Microsoft's Altair BASIC, where interleaved instructions mutually shared their instruction bytes.[20][12][17] The technique is rarely used today, but might still be necessary to resort to in areas where extreme optimization for size is necessary on byte-level such as in the implementation of boot loaders which have to fit into boot sectors.[nb 4]

It is also sometimes used as a code obfuscation technique as a measure against disassembly and tampering.[12][15]

The principle is also used in shared code sequences of fat binaries which must run on multiple instruction-set-incompatible processor platforms.[nb 3]

This property is also used to find unintended instructions called gadgets in existing code repositories and is used in return-oriented programming as alternative to code injection for exploits such as return-to-libc attacks.[21][12]

Relationship to microcode

[edit]

In some computers, the machine code of the architecture is implemented by an even more fundamental underlying layer called microcode, providing a common machine language interface across a line or family of different models of computer with widely different underlying dataflows. This is done to facilitate porting of machine language programs between different models.[22] An example of this use is the IBM System/360 family of computers and their successors.[23]

Relationship to bytecode

[edit]

Machine code is generally different from bytecode (also known as p-code), which is either executed by an interpreter or itself compiled into machine code for faster (direct) execution. An exception is when a processor is designed to use a particular bytecode directly as its machine code, such as is the case with Java processors.

Machine code and assembly code are sometimes called native code when referring to platform-dependent parts of language features or libraries.[24]

Storing in memory

[edit]

From the point of view of the CPU, machine code is stored in RAM, but is typically also kept in a set of caches for performance reasons. There may be different caches for instructions and data, depending on the architecture.[25]

In some systems, from the point of view of a process, the machine code lives in code space, a designated part of its address space. In a multi-threading environment, different threads of one process share code space along with data space, which reduces the overhead of context switching considerably as compared to process switching.[26]

The CPU knows what machine code to execute, based on its internal program counter.[27] The program counter points to a memory address and is changed based on special instructions which may cause programmatic branches.[28] The program counter is typically set to a hard coded value when the CPU is first powered on, and will hence execute whatever machine code happens to be at this address.[29]

Similarly, the program counter can be set to execute whatever machine code is at some arbitrary address, even if this is not valid machine code.[28] This will typically trigger an architecture specific protection fault.[30]

In a paging based system, the CPU is oftentimes told if the current page actually holds machine code by an execute bit — pages have multiple such permission bits (readable, writable, etc.) for various housekeeping functionality.[30] E.g. on Unix-like systems memory pages can be toggled to be executable with the mprotect() system call,[31] and on Windows, VirtualProtect() can be used to achieve a similar result.[32] If an attempt is made to execute machine code on a non-executable page, an architecture specific fault will typically occur.[30]

Similarly, in a segment based system, segment descriptors can indicate whether a segment can contain executable code and in what rings that code can run.[33]

In systems that lack this kind of protection, treating data as machine code, or finding new ways to use existing machine code, by various techniques, is the basis of some software exploits. For example, in Super Mario Bros. 3, manipulating the game's memory to resemble a jump instruction then forcing the game to execute that memory as code allows the player to win the game instantly.[34]

Readability by humans

[edit]

Machine code can be seen as a set of electrical pulses that make the instructions readable to the computer; it is not readable by humans,[35] with Douglas Hofstadter comparing it to examining the atoms of a DNA molecule.[36] However, various tools and methods exist to decode machine code to human-readable source code. One such method is disassembly, which easily decodes it back to its corresponding assembly language source code because assembly language forms a one-to-one mapping to machine code.[37]

Machine code may also be decoded to high-level language under two conditions. The first condition is to accept an obfuscated reading of the source code. An obfuscated version of source code is displayed if the machine code is sent to a decompiler of the source language. The second condition requires the machine code to have information about the source code encoded within. The information includes a symbol table that contains debug symbols. The symbol table may be stored within the executable, or it may exist in separate files. A debugger can then read the symbol table to help the programmer interactively debug the machine code in execution.

See also

[edit]

Notes

[edit]
  1. ^ On nonbinary machines it is, e.g., a decimal representation.
  2. ^ On early decimal machines, patterns of characters, digits and digit sign
  3. ^ a b While overlapping instructions on processor architectures with variable-length instruction sets can sometimes be arranged to merge different code paths back into one through control-flow resynchronization, overlapping code for different processor architectures can sometimes also be crafted to cause execution paths to branch into different directions depending on the underlying processor, as is sometimes used in fat binaries.
  4. ^ For example, the DR-DOS master boot records (MBRs) and boot sectors (which also hold the partition table and BIOS Parameter Block, leaving less than 446 respectively 423 bytes for the code) were traditionally able to locate the boot file in the FAT12 or FAT16 file system by themselves and load it into memory as a whole, in contrast to their counterparts in MS-DOS and PC DOS, which instead rely on the system files to occupy the first two directory entry locations in the file system and the first three sectors of IBMBIO.COM to be stored at the start of the data area in contiguous sectors containing a secondary loader to load the remainder of the file into memory (requiring SYS to take care of all these conditions). When FAT32 and logical block addressing (LBA) support was added, Microsoft even switched to require i386 instructions and split the boot code over two sectors for code size reasons, which was no option to follow for DR-DOS as it would have broken backward- and cross-compatibility with other operating systems in multi-boot and chain load scenarios, and as with older IBM PC–compatible PCs. Instead, the DR-DOS 7.07 boot sectors resorted to self-modifying code, opcode-level programming in machine language, controlled utilization of (documented) side effects, multi-level data/code overlapping and algorithmic folding techniques to still fit everything into a physical sector of only 512 bytes without giving up any of their extended functions.

References

[edit]
  1. ^ Stallings, William (2015). Computer Organization and Architecture 10th edition. Pearson Prentice Hall. p. 776. ISBN 9789332570405.
  2. ^ a b c Tanenbaum 1990, p. 251
  3. ^ Tanenbaum 1990, p. 162
  4. ^ Tanenbaum 1990, p. 231
  5. ^ Tanenbaum 1990, p. 237
  6. ^ Tanenbaum 1990, p. 236
  7. ^ a b Tanenbaum 1990, p. 253
  8. ^ Tanenbaum 1990, p. 283
  9. ^ Dourish, Paul (2004). Where the Action is: The Foundations of Embodied Interaction. MIT Press. p. 7. ISBN 0-262-54178-5. Retrieved 2025-08-05.
  10. ^ Zaks, Rodnay (1982). Programming the Z80 (Third Revised ed.). Sybex. pp. 67, 120, 609. ISBN 0-89588-094-6. Retrieved 2025-08-05.
  11. ^ a b c d e Harris, David; Harris, Sarah L. (2007). Digital Design and Computer Architecture. Morgan Kaufmann Publishers. ISBN 978-0-12-370497-9. Retrieved 2025-08-05.
  12. ^ a b c d e Jacob, Matthias; Jakubowski, Mariusz H.; Venkatesan, Ramarathnam [at Wikidata] (20–21 September 2007). Towards Integral Binary Execution: Implementing Oblivious Hashing Using Overlapped Instruction Encodings (PDF). Proceedings of the 9th workshop on Multimedia & Security (MM&Sec '07). Dallas, Texas, US: Association for Computing Machinery. pp. 129–140. CiteSeerX 10.1.1.69.5258. doi:10.1145/1288869.1288887. ISBN 978-1-59593-857-2. S2CID 14174680. Archived (PDF) from the original on 2025-08-05. Retrieved 2025-08-05. (12 pages)
  13. ^ Lagarias, Jeffrey "Jeff" Clark; Rains, Eric Michael; Vanderbei, Robert J. (2009) [2025-08-05]. "The Kruskal Count". In Brams, Stephen; Gehrlein, William V.; Roberts, Fred S. (eds.). The Mathematics of Preference, Choice and Order. Studies in Choice and Welfare. Berlin / Heidelberg, Germany: Springer-Verlag. pp. 371–391. arXiv:math/0110143. doi:10.1007/978-3-540-79128-7_23. ISBN 978-3-540-79127-0. (22 pages)
  14. ^ Andriesse, Dennis; Bos, Herbert [at Wikidata] (2025-08-05). Written at Vrije Universiteit Amsterdam, Amsterdam, Netherlands. Dietrich, Sven (ed.). Instruction-Level Steganography for Covert Trigger-Based Malware (PDF). 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Lecture Notes in Computer Science. Egham, UK; Switzerland: Springer International Publishing. pp. 41–50 [45]. doi:10.1007/978-3-319-08509-8_3. eISSN 1611-3349. ISBN 978-3-31908508-1. ISSN 0302-9743. S2CID 4634611. LNCS 8550. Archived (PDF) from the original on 2025-08-05. Retrieved 2025-08-05. (10 pages)
  15. ^ a b Jakubowski, Mariusz H. (February 2016). "Graph Based Model for Software Tamper Protection". Microsoft. Archived from the original on 2025-08-05. Retrieved 2025-08-05.
  16. ^ J?mthagen, Christopher (November 2016). On Offensive and Defensive Methods in Software Security (PDF) (Thesis). Lund, Sweden: Department of Electrical and Information Technology, Lund University. p. 96. ISBN 978-91-7623-942-1. ISSN 1654-790X. Archived (PDF) from the original on 2025-08-05. Retrieved 2025-08-05. (1+xvii+1+152 pages)
  17. ^ a b "Unintended Instructions on x86". Hacker News. 2021. Archived from the original on 2025-08-05. Retrieved 2025-08-05.
  18. ^ Kinder, Johannes (2025-08-05). Static Analysis of x86 Executables [Statische Analyse von Programmen in x86 Maschinensprache] (PDF) (Dissertation). Munich, Germany: Technische Universit?t Darmstadt. D17. Archived from the original on 2025-08-05. Retrieved 2025-08-05. (199 pages)
  19. ^ "What is "overlapping instructions" obfuscation?". Reverse Engineering Stack Exchange. 2025-08-05. Archived from the original on 2025-08-05. Retrieved 2025-08-05.
  20. ^ Gates, William "Bill" Henry, Personal communication (NB. According to Jacob et al.)
  21. ^ Shacham, Hovav (2007). The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) (PDF). Proceedings of the ACM, CCS 2007. ACM Press. Archived (PDF) from the original on 2025-08-05. Retrieved 2025-08-05.
  22. ^ Kent, Allen; Williams, James G. (2025-08-05). Encyclopedia of Computer Science and Technology: Volume 28 - Supplement 13: AerosPate Applications of Artificial Intelligence to Tree Structures. CRC Press. pp. 33–34. ISBN 978-0-8247-2281-4.
  23. ^ Tucker, S. G. (2025-08-05). "Microprogram control for SYSTEM/360". IBM Systems Journal. 6 (4): 222–241. doi:10.1147/sj.64.0222. ISSN 0018-8670 – via IEEE Xplore.
  24. ^ Gregory, Kate (2025-08-05). "Managed, Unmanaged, Native: What Kind of Code Is This?". Developer.com. Archived from the original on 2025-08-05. Retrieved 2025-08-05.
  25. ^ Su, Chao; Zeng, Qingkai (2021). "Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures". Security and Communication Networks. 2021 (1): 5559552. doi:10.1155/2021/5559552. ISSN 1939-0122.
  26. ^ "CS 537 Notes, Section #3A: Processes and Threads". pages.cs.wisc.edu. School of Computer, Data & Information Sciences, University of Wisconsin-Madison. Retrieved 2025-08-05.
  27. ^ Hayes, John Patrick (1978). Computer Architecture and Organization. McGraw-Hill. p. 245. ISBN 978-0-07-027363-4.
  28. ^ a b Principles of Operation, Type 701 and Associated Equipment (PDF). IBM. 1953. pp. 23–24.
  29. ^ Bates, Martin (2025-08-05). PIC Microcontrollers: An Introduction to Microelectronics. Elsevier. p. 30. ISBN 978-0-08-096911-4.
  30. ^ a b c Intel? 64 and IA-32 Architectures Software Developer's Manual, Volume 3A: System Programming Guide, Part 1 (PDF). Intel. September 2016. pp. 4-31 – 4-32, 5-2 – 5-3.
  31. ^ "mprotect(2) - Linux manual page". www.man7.org. Retrieved 2025-08-05.
  32. ^ karl-bridge-microsoft. "VirtualProtect function (memoryapi.h) - Win32 apps". learn.microsoft.com. Retrieved 2025-08-05.
  33. ^ Daniel Tabak (1995). Advanced microprocessors. Internet Archive. McGraw-Hill. p. 149. ISBN 978-0-07-062843-4.
  34. ^ Retro Game Mechanics Explained (2025-08-05). Super Mario Bros. 3 - Wrong Warp. Retrieved 2025-08-05 – via YouTube.
  35. ^ Samuelson 1984, p. 683.
  36. ^ Hofstadter 1979, p. 290.
  37. ^ Tanenbaum 1990, p. 398.
  38. ^ "Associated Data Architecture". High Level Assembler and Toolkit Feature.
  39. ^ "Associated data file output" (PDF). High Level Assembler for z/OS & z/VM & z/VSE - 1.6 -HLASM Programmer's Guide (PDF) (Eighth ed.). IBM. October 2022. pp. 278–332. SC26-4941-07. Retrieved 2025-08-05.
  40. ^ "COBOL SYSADATA file contents". Enterprise COBOL for z/OS.
  41. ^ "SYSADATA message information". Enterprise PL/I for z/OS 6.1 information. 2025-08-05.
  42. ^ "Appendix C. Generalized object file format (GOFF)" (PDF). z/OS - 3.1 - MVS Program Management: Advanced Facilities (PDF). IBM. 2025-08-05. pp. 201–240. SA23-1392-60. Retrieved 2025-08-05.
  43. ^ "Symbols for Windows debugging". Microsoft Learn. 2025-08-05.
  44. ^ "Querying the .Pdb File". Microsoft Learn. 2025-08-05.

Sources

[edit]

Further reading

[edit]
生吃大蒜有什么好处 筛窦炎吃什么药 桑葚有什么功效和作用 黑枸杞泡水喝有什么好处 cfp是什么证书
梦见老牛是什么意思 肌酐高说明什么问题 肌酸激酶偏低说明什么 来姨妈头疼是什么原因 壁挂式空调什么牌子好
人得了猫藓用什么药膏 什么是有氧运动什么是无氧运动 冰箱不制冷是什么原因 机关党委是干什么的 什么样的情况下会怀孕
为什么拉的屎是墨绿色 什么是有氧运动什么是无氧运动 区块链是什么 1月11日是什么星座 脑梗不能吃什么
前列腺在什么地方hcv7jop5ns5r.cn 身上长红色痣是什么原因hcv7jop6ns4r.cn 黑枸杞泡茶是什么颜色hcv9jop5ns7r.cn dc是什么牌子hcv9jop3ns9r.cn 气血虚吃什么补最快女人hcv9jop1ns9r.cn
林子祥属什么生肖bjcbxg.com 发糕是什么做的hcv9jop6ns3r.cn 狐臭是什么人种的后代hcv8jop7ns6r.cn 大体重减肥做什么运动jasonfriends.com 一什么节日hcv7jop6ns1r.cn
llc是什么意思hcv7jop6ns2r.cn 亚甲炎是什么原因引起的hcv9jop2ns7r.cn 吃什么不会胖又减肥hcv9jop6ns6r.cn 蝈蝈为什么不叫sanhestory.com 什么颜色加什么颜色等于蓝色hcv8jop8ns7r.cn
国防部长是什么级别hcv9jop0ns9r.cn 简历照片用什么底色hcv8jop6ns7r.cn 体制外是什么意思zhiyanzhang.com 什么叫meta分析hcv8jop2ns9r.cn 气血两亏是什么意思hcv9jop4ns8r.cn
百度