眼力见是什么意思| 马桶对着卫生间门有什么不好| 公主抱是什么意思| 腺体是什么| 下午五点半是什么时辰| 格斗和散打有什么区别| 统筹支付是什么意思| 什么解酒最快| 率性是什么意思| 尿蛋白高有什么危害| 吃什么长个子最快| 以身相许什么意思| 三叉戟是什么意思| 前列腺增大是什么意思| 脚趾痒是什么原因| 天数是什么意思| 牛肉炒什么好吃| 黑木耳不能和什么一起吃| 国企混改是什么意思| 包皮长挂什么科| 欢喜冤家是什么意思| 打葡萄糖点滴有什么用| 舌尖痛吃什么药| 肠道感染是什么原因引起的| 尿道感染是什么原因引起| 商是什么| 月经第三天属于什么期| 萎谢是什么意思| tmd是什么意思| 一月八号是什么星座| 减肥餐吃什么| 感光是什么意思| 蜥蜴吃什么| 舌头起泡是什么原因| 脚环肿是什么原因引起的| 15号来月经排卵期是什么时候| 什么是性激素| 胃镜挂什么科| 脚气缺什么维生素| 牙根发炎吃什么药| 卵巢囊性占位是什么意思| 什么是雾霾| 什么是抗生素类药物| 天梭表什么档次| 易拉罐是什么垃圾| 身先士卒是什么意思| 中暑的症状是什么| 河北古代叫什么| 珍珠疹是什么| 什么烟比较好抽| 秦始皇是芈月的什么人| 爱情的本质是什么| 震撼是什么意思| 奥地利讲什么语言| 右眼跳什么| 右肋下疼痛是什么原因| 无患子为什么叫鬼见愁| 狮子座是什么性格| 事无巨细是什么意思| 双向情感障碍是什么| hi什么意思| 银装素裹什么意思| 32周岁属什么生肖| 如日中天是什么生肖| 心绞痛吃什么药好| 白痰多是什么原因造成的| 蚕豆是什么豆| 阴囊潮湿吃什么药| 家父是什么意思| 五行什么生火| 什么是三净肉| 憋气2分钟算什么水平| 润字五行属什么| 男性生殖系统感染吃什么药| 月经不能吃什么水果| 经期提前是什么原因| 八仙过海是什么生肖| 总感觉饿是什么原因| 人老是犯困想睡觉是什么原因| 农历10月22日是什么星座| 为什么会抽搐| 四大才子是什么生肖| 李倩梅结局是什么| 黑是什么生肖| 脉搏细是什么原因| 么么什么意思| 高材生是什么意思| 又是什么意思| 鼻涕是绿色的是什么原因| 女人血稠吃什么食物好| 病危通知书意味着什么| 狗眼屎多是什么原因| 大臂疼痛怎么什么原因| 妲己属什么生肖| 甘油三酯偏高说明什么问题| 情种是什么意思| 合掌是什么意思| 肌层彩色血流星点状是什么意思| 什么菜养胃| 鬼打墙是什么意思| 什么原因导致流鼻血| 足字旁的字和什么有关| 沉不住气什么意思| 呕吐是什么原因引起的| 尿常规挂什么科| 三月底是什么星座| 七点半是什么时辰| 晚上很难入睡是什么原因| 吃什么润肺| 在家无聊可以做什么| 黄连泡水喝有什么功效| 果是什么意思| 腹泻是什么| 11月14日什么星座| 胆囊手术后不能吃什么| 上发条是什么意思| 煮中药用什么锅| 信口雌黄是什么意思| 脸上长痘痘用什么药膏效果好| 金樱子泡酒有什么功效| 谏什么意思| 脉搏细是什么原因| vocabulary是什么意思| 吃什么有助于睡眠| 鸡项是什么鸡| 排浊是什么意思| 稷字五行属什么| 耳朵嗡嗡响是什么原因| 最熟悉的陌生人是什么意思| 有什么无什么| 老虎头是什么牌子衣服| 塞浦路斯说什么语言| 门可罗雀什么意思| 什么的枫树| 土豆有什么营养价值| 孕妇吃辣椒对胎儿有什么影响| 突然发热是什么原因| 血糖低吃什么补的最快| 人体缺甲是什么症状| 鸟加衣念什么| 77是什么意思| 引力是什么| 茶歇是什么意思| 女人脑供血不足吃什么| 做梦掉粪坑什么征兆| 95年什么命| 安宫牛黄丸什么时间吃最好| 吃枸杞有什么功效| 日字旁和什么有关| 逆时针揉肚子起什么作用| 什么是酵素| 硝酸咪康唑乳膏和酮康唑乳膏有什么区别| 白玉菩提是什么材质| 生姜水洗头有什么好处| 着相什么意思| 什么是核素| 淋巴是什么引起的| 西瓜霜是什么做的| ipf是什么病| os是什么| 骨折吃什么水果| 花卉是什么| 58年属什么生肖| 1987属什么生肖| 大脑精神紊乱什么病| 见什么知什么| 什么是碱性磷酸酶高怎么回事| 射手座跟什么星座最配| 哈密瓜苦是什么原因| 线雕是什么| 21属什么| 疣吃什么药能治好| 喝什么茶最减肥| 洗耳朵用什么药水| 为什么会得阴道炎| 神经性头疼吃什么药好| 三九胃泰治什么胃病效果好| 脚臭用什么药| 臆想是什么意思| 什么是阴虱| 一什么阳光填量词| 乳腺钙化是什么意思啊| 昕字五行属什么| 6月28是什么星座| 桃酥为什么叫桃酥| 回归线是什么| 唇周发黑是什么原因| 排卵期会有什么症状| 四大皆空是什么生肖| 眼睛斜视是什么原因| 多发纳氏囊肿是什么意思| 牛和什么生肖相冲| 痛风不能吃什么| 靠腰是什么意思| 口苦口干吃什么药| 肝火上炎吃什么中成药| 榔头是什么意思| 手莫名其妙的肿了因为什么| toshiba是什么牌子| 手掌纹路多且杂乱是为什么| 窦炎症是什么病| 有机会是什么意思| 五味杂粮什么意思| 什么能解酒| 铁达时手表什么档次| 环磷酰胺是什么药| 屠苏酒是什么酒| 虎什么熊什么| 腹膜透析是什么意思| 什么是polo衫| 肝内血管瘤是什么意思| 解表化湿是什么意思| 茔是什么意思| 肌层回声均匀是什么意思| 脑供血不足吃什么好| 吃什么补黑色素最快| 梦到前妻预示什么| hpv检查什么项目| 昊是什么意思| 血管造影检查什么| 爱情是什么感觉| 地级市市长是什么级别| 排休是什么意思| 医学生规培是什么意思| 什么是癔症病| ac是什么意思| 型式检验是什么意思| 尿蛋白高吃什么食物好| 空调不出水是什么原因| 全心增大是什么意思| 卯宴席是什么意思| 短pr间期是什么意思| 分泌多巴胺是什么意思| 毛滴虫病是什么病| 寸脉弱是什么原因| 直视是什么意思| 一吃东西就牙疼是什么原因引起的| 退而求其次是什么意思| 西装革履什么意思| 胸口隐隐作痛挂什么科| 1月20是什么星座| 肝上火有什么症状| 飞行模式是什么意思| 哈气是什么意思| 人工受孕和试管婴儿有什么区别| 烦躁不安的意思是什么| 十二月二号是什么星座| 女单读什么| 昱读什么| 来月经喝红糖水有什么好处| 低钾会有什么症状| 湿邪是什么意思| 什么是0| 长目飞耳是什么动物| 什么是溶血症| 科目一和科目四有什么区别| cbg是什么意思| 愚痴是什么意思| 什么牛排最好吃| 技压群雄的意思是什么| 肛门周围潮湿瘙痒是什么原因| 周公吐哺天下归心是什么意思| 大麦是什么| 梦见办酒席是什么意思| 百度Jump to content

德银,欧洲银行业艰难重组的缩影

From Wikipedia, the free encyclopedia
百度 从我国第三支柱的定位,商业保险的特点和国际上第三支柱发展的经验看,现阶段我们应该优先发展税收递延性的商业养老保险。

Machine language monitor running on a W65C816S microprocessor, displaying code disassembly and dumps of processor register and memory

In computer programming, machine code is computer code consisting of machine language instructions, which are used to control a computer's central processing unit (CPU). For conventional binary computers, machine code is the binary[nb 1] representation of a computer program that is actually read and interpreted by the computer. A program in machine code consists of a sequence of machine instructions (possibly interspersed with data).[1]

Each machine code instruction causes the CPU to perform a specific task. Examples of such tasks include:

  1. Load a word from memory to a CPU register
  2. Execute an arithmetic logic unit (ALU) operation on one or more registers or memory locations
  3. Jump or skip to an instruction that is not the next one

In general, each architecture family (e.g., x86, ARM) has its own instruction set architecture (ISA), and hence its own specific machine code language. There are exceptions, such as the VAX architecture, which includes optional support of the PDP-11 instruction set; the IA-64 architecture, which includes optional support of the IA-32 instruction set; and the PowerPC 615 microprocessor, which can natively process both PowerPC and x86 instruction sets.

Machine code is a strictly numerical language, and it is the lowest-level interface to the CPU intended for a programmer. Assembly language provides a direct map between the numerical machine code and a human-readable mnemonic. In assembly, numerical machine code opcodes and operands are replaced with mnemonics and labels. For example, the x86 architecture has available the 0x90 opcode; it is represented as NOP in the assembly source code. While it is possible to write programs directly in machine code, managing individual bits and calculating numerical addresses is tedious and error-prone. Therefore, programs are rarely written directly in machine code. However, an existing machine code program may be edited if the assembly source code is not available.

The majority of programs today are written in a high-level language. A high-level program may be translated into machine code by a compiler.

Instruction set

[edit]

Every processor or processor family has its own instruction set. Machine instructions are patterns of bits[nb 2] that specify some particular action.[2] An instruction set is described by its instruction format. Some ways in which instruction formats may differ:[2]

  • all instructions may have the same length or instructions may have different lengths;
  • the number of instructions may be small or large;
  • instructions may or may not align with the architecture's word length.

A processor's instruction set needs to execute the circuits of a computer's digital logic level. At the digital level, the program needs to control the computer's registers, bus, memory, ALU, and other hardware components.[3] To control a computer's architectural features, machine instructions are created. Examples of features that are controlled using machine instructions:

The criteria for instruction formats include:

  • Instructions most commonly used should be shorter than instructions rarely used.[2]
  • The memory transfer rate of the underlying hardware determines the flexibility of the memory fetch instructions.
  • The number of bits in the address field requires special consideration.[7]

Determining the size of the address field is a choice between space and speed.[7] On some computers, the number of bits in the address field may be too small to access all of the physical memory. Also, virtual address space needs to be considered. Another constraint may be a limitation on the size of registers used to construct the address. Whereas a shorter address field allows the instructions to execute more quickly, other physical properties need to be considered when designing the instruction format.

Instructions can be separated into two types: general-purpose and special-purpose. Special-purpose instructions exploit architectural features that are unique to a computer. General-purpose instructions control architectural features common to all computers.[8]

General-purpose instructions control:

  • Data movement from one place to another
  • Monadic operations that have one operand to produce a result
  • Dyadic operations that have two operands to produce a result
  • Comparisons and conditional jumps
  • Procedure calls
  • Loop control
  • Input/output

Assembly languages

[edit]
Translation of assembly language into machine language

A much more human-friendly rendition of machine language, named assembly language, uses mnemonic codes to refer to machine code instructions, rather than using the instructions' numeric values directly, and uses symbolic names to refer to storage locations and sometimes registers.[9] For example, on the Zilog Z80 processor, the machine code 00000101, which causes the CPU to decrement the B general-purpose register, would be represented in assembly language as DEC B.[10]

Examples

[edit]

IBM 709x

[edit]

The IBM 704, 709, 704x and 709x store one instruction in each instruction word; IBM numbers the bit from the left as S, 1, ..., 35. Most instructions have one of two formats:

Generic
S,1-11
12-13 Flag, ignored in some instructions
14-17 unused
18-20 Tag
21-35 Y
Index register control, other than TSX
S,1-2 Opcode
3-17 Decrement
18-20 Tag
21-35 Y

For all but the IBM 7094 and 7094 II, there are three index registers designated A, B and C; indexing with multiple 1 bits in the tag subtracts the logical or of the selected index registers and loading with multiple 1 bits in the tag loads all of the selected index registers. The 7094 and 7094 II have seven index registers, but when they are powered on they are in multiple tag mode, in which they use only the three of the index registers in a fashion compatible with earlier machines, and require a Leave Multiple Tag Mode (LMTM) instruction in order to access the other four index registers.

The effective address is normally Y-C(T), where C(T) is either 0 for a tag of 0, the logical or of the selected index registers in multiple tag mode or the selected index register if not in multiple tag mode. However, the effective address for index register control instructions is just Y.

A flag with both bits 1 selects indirect addressing; the indirect address word has both a tag and a Y field.

In addition to transfer (branch) instructions, these machines have skip instruction that conditionally skip one or two words, e.g., Compare Accumulator with Storage (CAS) does a three way compare and conditionally skips to NSI, NSI+1 or NSI+2, depending on the result.

MIPS

[edit]

The MIPS architecture provides a specific example for a machine code whose instructions are always 32 bits long.[11]:?299? The general type of instruction is given by the op (operation) field, the highest 6 bits. J-type (jump) and I-type (immediate) instructions are fully specified by op. R-type (register) instructions include an additional field funct to determine the exact operation. The fields used in these types are:

   6      5     5     5     5      6 bits
[  op  |  rs |  rt |  rd |shamt| funct]  R-type
[  op  |  rs |  rt | address/immediate]  I-type
[  op  |        target address        ]  J-type

rs, rt, and rd indicate register operands; shamt gives a shift amount; and the address or immediate fields contain an operand directly.[11]:?299–301?

For example, adding the registers 1 and 2 and placing the result in register 6 is encoded:[11]:?554?

[  op  |  rs |  rt |  rd |shamt| funct]
    0     1     2     6     0     32     decimal
 000000 00001 00010 00110 00000 100000   binary

Load a value into register 8, taken from the memory cell 68 cells after the location listed in register 3:[11]:?552?

[  op  |  rs |  rt | address/immediate]
   35     3     8           68           decimal
 100011 00011 01000 00000 00001 000100   binary

Jumping to the address 1024:[11]:?552?

[  op  |        target address        ]
    2                 1024               decimal
 000010 00000 00000 00000 10000 000000   binary

Overlapping instructions

[edit]

On processor architectures with variable-length instruction sets[12] (such as Intel's x86 processor family) it is, within the limits of the control-flow resynchronizing phenomenon known as the Kruskal count,[13][12][14][15][16] sometimes possible through opcode-level programming to deliberately arrange the resulting code so that two code paths share a common fragment of opcode sequences.[nb 3] These are called overlapping instructions, overlapping opcodes, overlapping code, overlapped code, instruction scission, or jump into the middle of an instruction.[17][18][19]

In the 1970s and 1980s, overlapping instructions were sometimes used to preserve memory space. One example were in the implementation of error tables in Microsoft's Altair BASIC, where interleaved instructions mutually shared their instruction bytes.[20][12][17] The technique is rarely used today, but might still be necessary to resort to in areas where extreme optimization for size is necessary on byte-level such as in the implementation of boot loaders which have to fit into boot sectors.[nb 4]

It is also sometimes used as a code obfuscation technique as a measure against disassembly and tampering.[12][15]

The principle is also used in shared code sequences of fat binaries which must run on multiple instruction-set-incompatible processor platforms.[nb 3]

This property is also used to find unintended instructions called gadgets in existing code repositories and is used in return-oriented programming as alternative to code injection for exploits such as return-to-libc attacks.[21][12]

Relationship to microcode

[edit]

In some computers, the machine code of the architecture is implemented by an even more fundamental underlying layer called microcode, providing a common machine language interface across a line or family of different models of computer with widely different underlying dataflows. This is done to facilitate porting of machine language programs between different models.[22] An example of this use is the IBM System/360 family of computers and their successors.[23]

Relationship to bytecode

[edit]

Machine code is generally different from bytecode (also known as p-code), which is either executed by an interpreter or itself compiled into machine code for faster (direct) execution. An exception is when a processor is designed to use a particular bytecode directly as its machine code, such as is the case with Java processors.

Machine code and assembly code are sometimes called native code when referring to platform-dependent parts of language features or libraries.[24]

Storing in memory

[edit]

From the point of view of the CPU, machine code is stored in RAM, but is typically also kept in a set of caches for performance reasons. There may be different caches for instructions and data, depending on the architecture.[25]

In some systems, from the point of view of a process, the machine code lives in code space, a designated part of its address space. In a multi-threading environment, different threads of one process share code space along with data space, which reduces the overhead of context switching considerably as compared to process switching.[26]

The CPU knows what machine code to execute, based on its internal program counter.[27] The program counter points to a memory address and is changed based on special instructions which may cause programmatic branches.[28] The program counter is typically set to a hard coded value when the CPU is first powered on, and will hence execute whatever machine code happens to be at this address.[29]

Similarly, the program counter can be set to execute whatever machine code is at some arbitrary address, even if this is not valid machine code.[28] This will typically trigger an architecture specific protection fault.[30]

In a paging based system, the CPU is oftentimes told if the current page actually holds machine code by an execute bit — pages have multiple such permission bits (readable, writable, etc.) for various housekeeping functionality.[30] E.g. on Unix-like systems memory pages can be toggled to be executable with the mprotect() system call,[31] and on Windows, VirtualProtect() can be used to achieve a similar result.[32] If an attempt is made to execute machine code on a non-executable page, an architecture specific fault will typically occur.[30]

Similarly, in a segment based system, segment descriptors can indicate whether a segment can contain executable code and in what rings that code can run.[33]

In systems that lack this kind of protection, treating data as machine code, or finding new ways to use existing machine code, by various techniques, is the basis of some software exploits. For example, in Super Mario Bros. 3, manipulating the game's memory to resemble a jump instruction then forcing the game to execute that memory as code allows the player to win the game instantly.[34]

Readability by humans

[edit]

Machine code can be seen as a set of electrical pulses that make the instructions readable to the computer; it is not readable by humans,[35] with Douglas Hofstadter comparing it to examining the atoms of a DNA molecule.[36] However, various tools and methods exist to decode machine code to human-readable source code. One such method is disassembly, which easily decodes it back to its corresponding assembly language source code because assembly language forms a one-to-one mapping to machine code.[37]

Machine code may also be decoded to high-level language under two conditions. The first condition is to accept an obfuscated reading of the source code. An obfuscated version of source code is displayed if the machine code is sent to a decompiler of the source language. The second condition requires the machine code to have information about the source code encoded within. The information includes a symbol table that contains debug symbols. The symbol table may be stored within the executable, or it may exist in separate files. A debugger can then read the symbol table to help the programmer interactively debug the machine code in execution.

See also

[edit]

Notes

[edit]
  1. ^ On nonbinary machines it is, e.g., a decimal representation.
  2. ^ On early decimal machines, patterns of characters, digits and digit sign
  3. ^ a b While overlapping instructions on processor architectures with variable-length instruction sets can sometimes be arranged to merge different code paths back into one through control-flow resynchronization, overlapping code for different processor architectures can sometimes also be crafted to cause execution paths to branch into different directions depending on the underlying processor, as is sometimes used in fat binaries.
  4. ^ For example, the DR-DOS master boot records (MBRs) and boot sectors (which also hold the partition table and BIOS Parameter Block, leaving less than 446 respectively 423 bytes for the code) were traditionally able to locate the boot file in the FAT12 or FAT16 file system by themselves and load it into memory as a whole, in contrast to their counterparts in MS-DOS and PC DOS, which instead rely on the system files to occupy the first two directory entry locations in the file system and the first three sectors of IBMBIO.COM to be stored at the start of the data area in contiguous sectors containing a secondary loader to load the remainder of the file into memory (requiring SYS to take care of all these conditions). When FAT32 and logical block addressing (LBA) support was added, Microsoft even switched to require i386 instructions and split the boot code over two sectors for code size reasons, which was no option to follow for DR-DOS as it would have broken backward- and cross-compatibility with other operating systems in multi-boot and chain load scenarios, and as with older IBM PC–compatible PCs. Instead, the DR-DOS 7.07 boot sectors resorted to self-modifying code, opcode-level programming in machine language, controlled utilization of (documented) side effects, multi-level data/code overlapping and algorithmic folding techniques to still fit everything into a physical sector of only 512 bytes without giving up any of their extended functions.

References

[edit]
  1. ^ Stallings, William (2015). Computer Organization and Architecture 10th edition. Pearson Prentice Hall. p. 776. ISBN 9789332570405.
  2. ^ a b c Tanenbaum 1990, p. 251
  3. ^ Tanenbaum 1990, p. 162
  4. ^ Tanenbaum 1990, p. 231
  5. ^ Tanenbaum 1990, p. 237
  6. ^ Tanenbaum 1990, p. 236
  7. ^ a b Tanenbaum 1990, p. 253
  8. ^ Tanenbaum 1990, p. 283
  9. ^ Dourish, Paul (2004). Where the Action is: The Foundations of Embodied Interaction. MIT Press. p. 7. ISBN 0-262-54178-5. Retrieved 2025-08-04.
  10. ^ Zaks, Rodnay (1982). Programming the Z80 (Third Revised ed.). Sybex. pp. 67, 120, 609. ISBN 0-89588-094-6. Retrieved 2025-08-04.
  11. ^ a b c d e Harris, David; Harris, Sarah L. (2007). Digital Design and Computer Architecture. Morgan Kaufmann Publishers. ISBN 978-0-12-370497-9. Retrieved 2025-08-04.
  12. ^ a b c d e Jacob, Matthias; Jakubowski, Mariusz H.; Venkatesan, Ramarathnam [at Wikidata] (20–21 September 2007). Towards Integral Binary Execution: Implementing Oblivious Hashing Using Overlapped Instruction Encodings (PDF). Proceedings of the 9th workshop on Multimedia & Security (MM&Sec '07). Dallas, Texas, US: Association for Computing Machinery. pp. 129–140. CiteSeerX 10.1.1.69.5258. doi:10.1145/1288869.1288887. ISBN 978-1-59593-857-2. S2CID 14174680. Archived (PDF) from the original on 2025-08-04. Retrieved 2025-08-04. (12 pages)
  13. ^ Lagarias, Jeffrey "Jeff" Clark; Rains, Eric Michael; Vanderbei, Robert J. (2009) [2025-08-04]. "The Kruskal Count". In Brams, Stephen; Gehrlein, William V.; Roberts, Fred S. (eds.). The Mathematics of Preference, Choice and Order. Studies in Choice and Welfare. Berlin / Heidelberg, Germany: Springer-Verlag. pp. 371–391. arXiv:math/0110143. doi:10.1007/978-3-540-79128-7_23. ISBN 978-3-540-79127-0. (22 pages)
  14. ^ Andriesse, Dennis; Bos, Herbert [at Wikidata] (2025-08-04). Written at Vrije Universiteit Amsterdam, Amsterdam, Netherlands. Dietrich, Sven (ed.). Instruction-Level Steganography for Covert Trigger-Based Malware (PDF). 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Lecture Notes in Computer Science. Egham, UK; Switzerland: Springer International Publishing. pp. 41–50 [45]. doi:10.1007/978-3-319-08509-8_3. eISSN 1611-3349. ISBN 978-3-31908508-1. ISSN 0302-9743. S2CID 4634611. LNCS 8550. Archived (PDF) from the original on 2025-08-04. Retrieved 2025-08-04. (10 pages)
  15. ^ a b Jakubowski, Mariusz H. (February 2016). "Graph Based Model for Software Tamper Protection". Microsoft. Archived from the original on 2025-08-04. Retrieved 2025-08-04.
  16. ^ J?mthagen, Christopher (November 2016). On Offensive and Defensive Methods in Software Security (PDF) (Thesis). Lund, Sweden: Department of Electrical and Information Technology, Lund University. p. 96. ISBN 978-91-7623-942-1. ISSN 1654-790X. Archived (PDF) from the original on 2025-08-04. Retrieved 2025-08-04. (1+xvii+1+152 pages)
  17. ^ a b "Unintended Instructions on x86". Hacker News. 2021. Archived from the original on 2025-08-04. Retrieved 2025-08-04.
  18. ^ Kinder, Johannes (2025-08-04). Static Analysis of x86 Executables [Statische Analyse von Programmen in x86 Maschinensprache] (PDF) (Dissertation). Munich, Germany: Technische Universit?t Darmstadt. D17. Archived from the original on 2025-08-04. Retrieved 2025-08-04. (199 pages)
  19. ^ "What is "overlapping instructions" obfuscation?". Reverse Engineering Stack Exchange. 2025-08-04. Archived from the original on 2025-08-04. Retrieved 2025-08-04.
  20. ^ Gates, William "Bill" Henry, Personal communication (NB. According to Jacob et al.)
  21. ^ Shacham, Hovav (2007). The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) (PDF). Proceedings of the ACM, CCS 2007. ACM Press. Archived (PDF) from the original on 2025-08-04. Retrieved 2025-08-04.
  22. ^ Kent, Allen; Williams, James G. (2025-08-04). Encyclopedia of Computer Science and Technology: Volume 28 - Supplement 13: AerosPate Applications of Artificial Intelligence to Tree Structures. CRC Press. pp. 33–34. ISBN 978-0-8247-2281-4.
  23. ^ Tucker, S. G. (2025-08-04). "Microprogram control for SYSTEM/360". IBM Systems Journal. 6 (4): 222–241. doi:10.1147/sj.64.0222. ISSN 0018-8670 – via IEEE Xplore.
  24. ^ Gregory, Kate (2025-08-04). "Managed, Unmanaged, Native: What Kind of Code Is This?". Developer.com. Archived from the original on 2025-08-04. Retrieved 2025-08-04.
  25. ^ Su, Chao; Zeng, Qingkai (2021). "Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures". Security and Communication Networks. 2021 (1): 5559552. doi:10.1155/2021/5559552. ISSN 1939-0122.
  26. ^ "CS 537 Notes, Section #3A: Processes and Threads". pages.cs.wisc.edu. School of Computer, Data & Information Sciences, University of Wisconsin-Madison. Retrieved 2025-08-04.
  27. ^ Hayes, John Patrick (1978). Computer Architecture and Organization. McGraw-Hill. p. 245. ISBN 978-0-07-027363-4.
  28. ^ a b Principles of Operation, Type 701 and Associated Equipment (PDF). IBM. 1953. pp. 23–24.
  29. ^ Bates, Martin (2025-08-04). PIC Microcontrollers: An Introduction to Microelectronics. Elsevier. p. 30. ISBN 978-0-08-096911-4.
  30. ^ a b c Intel? 64 and IA-32 Architectures Software Developer's Manual, Volume 3A: System Programming Guide, Part 1 (PDF). Intel. September 2016. pp. 4-31 – 4-32, 5-2 – 5-3.
  31. ^ "mprotect(2) - Linux manual page". www.man7.org. Retrieved 2025-08-04.
  32. ^ karl-bridge-microsoft. "VirtualProtect function (memoryapi.h) - Win32 apps". learn.microsoft.com. Retrieved 2025-08-04.
  33. ^ Daniel Tabak (1995). Advanced microprocessors. Internet Archive. McGraw-Hill. p. 149. ISBN 978-0-07-062843-4.
  34. ^ Retro Game Mechanics Explained (2025-08-04). Super Mario Bros. 3 - Wrong Warp. Retrieved 2025-08-04 – via YouTube.
  35. ^ Samuelson 1984, p. 683.
  36. ^ Hofstadter 1979, p. 290.
  37. ^ Tanenbaum 1990, p. 398.
  38. ^ "Associated Data Architecture". High Level Assembler and Toolkit Feature.
  39. ^ "Associated data file output" (PDF). High Level Assembler for z/OS & z/VM & z/VSE - 1.6 -HLASM Programmer's Guide (PDF) (Eighth ed.). IBM. October 2022. pp. 278–332. SC26-4941-07. Retrieved 2025-08-04.
  40. ^ "COBOL SYSADATA file contents". Enterprise COBOL for z/OS.
  41. ^ "SYSADATA message information". Enterprise PL/I for z/OS 6.1 information. 2025-08-04.
  42. ^ "Appendix C. Generalized object file format (GOFF)" (PDF). z/OS - 3.1 - MVS Program Management: Advanced Facilities (PDF). IBM. 2025-08-04. pp. 201–240. SA23-1392-60. Retrieved 2025-08-04.
  43. ^ "Symbols for Windows debugging". Microsoft Learn. 2025-08-04.
  44. ^ "Querying the .Pdb File". Microsoft Learn. 2025-08-04.

Sources

[edit]

Further reading

[edit]
懊恼是什么意思 葡萄柚是什么水果 cartoon什么意思 草莓是什么意思 看肾挂什么科
6月14日是什么星座 为什么我的眼中常含泪水 三个箭头朝下是什么牌子 头孢和阿莫西林有什么区别 吃什么可以补充雌激素
胆囊息肉是什么 祛斑产品什么好 碳水化合物是什么意思 银色是什么颜色 柠檬泡水有什么好处
什么网名好听 什么把什么造句子 鬼长什么样子 什么是招风耳图片 梦见放烟花是什么征兆
九月二十是什么星座hcv8jop7ns6r.cn 桑树枝煮水有什么功效hcv8jop5ns6r.cn 嫡母是什么意思yanzhenzixun.com 肛门下坠吃什么药hcv9jop3ns4r.cn 癸水是什么hcv9jop1ns3r.cn
口蜜什么剑hcv9jop7ns2r.cn en是什么意思hcv8jop0ns8r.cn itp是什么病hcv8jop9ns8r.cn 永无止境是什么意思hcv7jop5ns0r.cn 向日葵什么时候播种hcv7jop5ns6r.cn
心脏增大吃什么药hcv9jop1ns5r.cn 耳朵痒用什么药最有效hcv9jop0ns6r.cn 炖鸡汤放什么材料好吃hcv9jop5ns3r.cn 法图麦在回族什么意思hcv9jop0ns9r.cn 十一月底是什么星座hcv9jop4ns5r.cn
9.29是什么星座hcv8jop4ns4r.cn 悲智双运什么意思tiangongnft.com 产后第一次来月经是什么颜色hcv9jop6ns7r.cn 牙龈肿痛是什么原因zhongyiyatai.com 小脑梗塞会出现什么症状hcv8jop8ns6r.cn
百度