女人更年期什么症状| 散文是什么意思| 毛手毛脚什么意思| 什么是射精| 脑疝是什么原因引起的| mono是什么意思| 逍遥丸治什么病| 大臂疼痛怎么什么原因| 卵巢早衰是什么引起的| 芥菜是什么| 食物中毒挂什么科| 眉毛淡的男人代表什么| 男人眉骨高代表什么| 便秘吃什么能通便| 肾精亏虚吃什么药最好| 怀孕会出现什么状况| 胃窦肠化是什么意思| 1926年属什么| 经信局是干什么的| 辛是什么意思| 8月15是什么星座| 打封闭是什么意思| 祸起萧墙的萧墙指什么| 犹太人为什么叫犹太人| 相拥是什么意思| 曹操姓什么| mr和mri有什么区别| 灵官爷是什么神| 牙周炎用什么药最见效| 吃什么放屁多| 灯红酒绿是什么意思| 什么蔬菜含维生素c最多| 米糠是什么东西| 血小板为0意味着什么| 红细胞低吃什么补得快| 小孩吃什么有营养| 女性的排卵期是什么时候| 大便出油是什么原因| lancome是什么牌子的| 白起为什么被赐死| 吃什么降三高最好| 指甲变黑是什么原因| 世袭罔替什么意思| 哥哥的孩子叫什么| 心脏右束支传导阻滞是什么意思| 大疱性皮肤病是什么病| 抽水是什么意思| 玉米什么时候成熟| 维生素b族适合什么人吃| 转氨酶高说明什么| 区域经理的岗位职责是什么| 1983属什么生肖| 6月18号是什么日子| 葫芦鸡为什么叫葫芦鸡| 台湾三小是什么意思| 脚脱皮是什么原因| 吃什么可以提高免疫力| 肚子疼应该挂什么科| 早教是什么| 什么欲滴| 流年不利什么意思| 1902年属什么生肖| 脑门痒痒是什么预兆| 子宫偏小有什么影响| 秋天的落叶像什么| 六十而耳顺是什么意思| 苟不教的苟是什么意思| 游走是什么意思| 包粽子用什么米| mr是什么检查项目| camus是什么酒| 什么是集成灶| 氯雷他定片什么时候吃| 来月经同房会有什么后果| 反应蛋白测定是查什么的| 有过之而不及是什么意思| r医学是什么意思| 三个贝念什么| clarks是什么牌子| 梦见下暴雨是什么意思| 杠杆率是什么意思| 血小板低吃什么水果好| 白子是什么| 喜气洋洋是什么意思| 老人手抖是什么病的预兆| 什么地望着| 什么东西解腻| 胸部正位片检查什么| 正确的三观是什么| 牛蛙和青蛙有什么区别| 肛周脓肿吃什么消炎药| 缢死是什么意思| 高攀是什么意思| 神经纤维是什么| 晨尿泡沫多是什么原因| 中元节与什么生肖有关| 稽留流产什么意思| 1.1是什么星座| 代谢不好吃什么药| 玉米有什么营养价值| 相忘于江湖是什么意思| 视力模糊什么原因| 高血脂吃什么食物最好| 癞子是什么意思| 梦见买帽子是什么意思| 丙酮是什么| 什么茶能去体内湿气| 心包积液吃什么药| baumwolle是什么面料| 牙疼吃什么食物好得快| 河南话信球是什么意思| 什么小吃最火爆最赚钱| 体内湿气重吃什么药| 两个叉念什么| 阈值是什么意思| 团购是什么意思| 去迪拜打工需要什么条件| 12颗珠子的手串什么意思| 脑供血不足是什么原因| 竹叶青是什么茶| 脾大是怎么回事有什么危害| 秋后问斩是什么意思| 精神紊乱吃什么药| 血管炎不能吃什么食物| 执子之手与子偕老什么意思| 什么是集体户口| 翘嘴鱼吃什么食物| 美女的阴暗是什么样的| 荨麻疹为什么晚上起| 28年属什么生肖| 孙膑是什么学派| 周二右眼皮跳是什么预兆| 为什么会甲减| 一什么新闻| 内退是什么意思| 小子是什么意思| 属猴配什么属相最好| 维生素c有什么好处| 什么是气血| 打嗝吃什么药效果好| 烂脚丫用什么药最好| 两个人可以玩什么| 心凉是什么意思| 淡奶油能做什么| 血小板低有什么症状| 猫可以吃什么水果| 昆仑山在什么地方| 上腹胀是什么原因| 为什么经常打嗝| dpa是什么意思| 为什么8到10周容易胎停| 白带豆腐渣用什么药| trans什么意思| 肛门出血用什么药| 心动过速吃什么药最好| 为什么乳头会痒| 87岁属什么| 人为什么怕蛇| 什么叫cp| pcl是什么意思| 空调扇的冰晶是什么| 九月二十二是什么星座| 梦见和女儿吵架是什么意思| 肾萎缩是什么原因引起的| 蛇和什么属相相冲| 藕断丝连是什么意思| 菠萝蜜和什么不能一起吃| 菠萝与凤梨有什么区别| 颈部有肿块看什么科室| 1月27号是什么星座| 额窦炎吃什么药效果好| 农历今天属什么生肖| 鼻子经常流鼻涕是什么原因| 眼睛散光和近视有什么区别| 两袖清风是什么生肖| 亲情是什么意思| 卯木代表什么| 护士证什么时候下来| 美甲做多了有什么危害| 动态心电图能检查出什么病| 破费是什么意思| pck是什么意思| 为什么会血脂高| 胃阴虚有什么症状| 衙内是什么意思| 云南白药的保险子是起什么作用的| 什么是白带| 共济会是什么组织| 红萝卜什么时候种| 什么鱼吃泥鳅| 紫字五行属什么| 百米12秒什么水平| 瞳孔缩小见于什么病| 坐地能吸土是什么意思| 两色富足间是什么生肖| 老年人吃什么钙片好| 什么的莲蓬| 拉杆箱什么材质的好| 肠胃炎喝什么药| 红细胞阳性是什么意思| 鱼露是什么| 肺结核可以做什么运动| 月经过多是什么原因| 杨贵妃长什么样| 青蒿素是什么| 淋巴细胞计数偏低是什么原因| 长白班是什么意思| 虢是什么意思| 什么的流| 四肢冰凉是什么原因| 逍遥丸什么人不能吃| 春季感冒吃什么药| 糖化是什么意思| 脚气脱皮用什么药最好| 肝病看什么科室| 什么水果含铁| 半干型黄酒是什么意思| 啖是什么意思| 荨麻疹用什么药膏| 梨和什么一起榨汁好喝| 甲亢吃什么盐好| 一个王一个八念什么| pt是什么意思| 过敏不能吃什么东西| 阴道流黄水是什么病| 做爱时间短吃什么药好| 今天是什么月| 睡眠障碍是什么原因引起的| 孕吐什么时候开始| 杨梅泡酒有什么功效| 全身是宝的动物是什么生肖| 2024是什么年生肖| 自五行属什么| 亚型是什么意思| 胃寒吃什么药最有效| 甲低是什么原因造成的| 吃益生菌有什么好处| 宝宝头发黄是缺什么| 为什么月经前乳房胀痛| 拥趸是什么意思| 搭桥和支架有什么区别| 老虎油是什么意思| 飞车是什么意思| 恶心头晕是什么症状| 上皮细胞一个加号什么意思| 右上眼皮跳是什么预兆| 什么是手淫| noah是什么牌子| 经常耳鸣是为什么| 什么叫高潮| 渠道医院是什么意思| 肚子大了是什么原因造成的| 天下乌鸦一般黑是什么意思| 辣的部首是什么| 螳螂是什么生肖| 随心所欲的欲什么意思| 睡觉为什么磨牙| 有脚气用什么药| 石斛什么人不适合吃| 阿普唑仑是什么药| 什么生长| 烂大街是什么意思| 为什么身上会痒| 愤青什么意思| 百度Jump to content

今年圣诞,法国人会送什么书?

From Wikipedia, the free encyclopedia
(Redirected from Machine language)
百度 那么,要考察的就是,限购取消之后,效果如何。

Machine language monitor running on a W65C816S microprocessor, displaying code disassembly and dumps of processor register and memory

In computer programming, machine code is computer code consisting of machine language instructions, which are used to control a computer's central processing unit (CPU). For conventional binary computers, machine code is the binary[nb 1] representation of a computer program that is actually read and interpreted by the computer. A program in machine code consists of a sequence of machine instructions (possibly interspersed with data).[1]

Each machine code instruction causes the CPU to perform a specific task. Examples of such tasks include:

  1. Load a word from memory to a CPU register
  2. Execute an arithmetic logic unit (ALU) operation on one or more registers or memory locations
  3. Jump or skip to an instruction that is not the next one

In general, each architecture family (e.g., x86, ARM) has its own instruction set architecture (ISA), and hence its own specific machine code language. There are exceptions, such as the VAX architecture, which includes optional support of the PDP-11 instruction set; the IA-64 architecture, which includes optional support of the IA-32 instruction set; and the PowerPC 615 microprocessor, which can natively process both PowerPC and x86 instruction sets.

Machine code is a strictly numerical language, and it is the lowest-level interface to the CPU intended for a programmer. Assembly language provides a direct map between the numerical machine code and a human-readable mnemonic. In assembly, numerical machine code opcodes and operands are replaced with mnemonics and labels. For example, the x86 architecture has available the 0x90 opcode; it is represented as NOP in the assembly source code. While it is possible to write programs directly in machine code, managing individual bits and calculating numerical addresses is tedious and error-prone. Therefore, programs are rarely written directly in machine code. However, an existing machine code program may be edited if the assembly source code is not available.

The majority of programs today are written in a high-level language. A high-level program may be translated into machine code by a compiler.

Instruction set

[edit]

Every processor or processor family has its own instruction set. Machine instructions are patterns of bits[nb 2] that specify some particular action.[2] An instruction set is described by its instruction format. Some ways in which instruction formats may differ:[2]

  • all instructions may have the same length or instructions may have different lengths;
  • the number of instructions may be small or large;
  • instructions may or may not align with the architecture's word length.

A processor's instruction set needs to execute the circuits of a computer's digital logic level. At the digital level, the program needs to control the computer's registers, bus, memory, ALU, and other hardware components.[3] To control a computer's architectural features, machine instructions are created. Examples of features that are controlled using machine instructions:

The criteria for instruction formats include:

  • Instructions most commonly used should be shorter than instructions rarely used.[2]
  • The memory transfer rate of the underlying hardware determines the flexibility of the memory fetch instructions.
  • The number of bits in the address field requires special consideration.[7]

Determining the size of the address field is a choice between space and speed.[7] On some computers, the number of bits in the address field may be too small to access all of the physical memory. Also, virtual address space needs to be considered. Another constraint may be a limitation on the size of registers used to construct the address. Whereas a shorter address field allows the instructions to execute more quickly, other physical properties need to be considered when designing the instruction format.

Instructions can be separated into two types: general-purpose and special-purpose. Special-purpose instructions exploit architectural features that are unique to a computer. General-purpose instructions control architectural features common to all computers.[8]

General-purpose instructions control:

  • Data movement from one place to another
  • Monadic operations that have one operand to produce a result
  • Dyadic operations that have two operands to produce a result
  • Comparisons and conditional jumps
  • Procedure calls
  • Loop control
  • Input/output

Assembly languages

[edit]
Translation of assembly language into machine language

A much more human-friendly rendition of machine language, named assembly language, uses mnemonic codes to refer to machine code instructions, rather than using the instructions' numeric values directly, and uses symbolic names to refer to storage locations and sometimes registers.[9] For example, on the Zilog Z80 processor, the machine code 00000101, which causes the CPU to decrement the B general-purpose register, would be represented in assembly language as DEC B.[10]

Examples

[edit]

IBM 709x

[edit]

The IBM 704, 709, 704x and 709x store one instruction in each instruction word; IBM numbers the bit from the left as S, 1, ..., 35. Most instructions have one of two formats:

Generic
S,1-11
12-13 Flag, ignored in some instructions
14-17 unused
18-20 Tag
21-35 Y
Index register control, other than TSX
S,1-2 Opcode
3-17 Decrement
18-20 Tag
21-35 Y

For all but the IBM 7094 and 7094 II, there are three index registers designated A, B and C; indexing with multiple 1 bits in the tag subtracts the logical or of the selected index registers and loading with multiple 1 bits in the tag loads all of the selected index registers. The 7094 and 7094 II have seven index registers, but when they are powered on they are in multiple tag mode, in which they use only the three of the index registers in a fashion compatible with earlier machines, and require a Leave Multiple Tag Mode (LMTM) instruction in order to access the other four index registers.

The effective address is normally Y-C(T), where C(T) is either 0 for a tag of 0, the logical or of the selected index registers in multiple tag mode or the selected index register if not in multiple tag mode. However, the effective address for index register control instructions is just Y.

A flag with both bits 1 selects indirect addressing; the indirect address word has both a tag and a Y field.

In addition to transfer (branch) instructions, these machines have skip instruction that conditionally skip one or two words, e.g., Compare Accumulator with Storage (CAS) does a three way compare and conditionally skips to NSI, NSI+1 or NSI+2, depending on the result.

MIPS

[edit]

The MIPS architecture provides a specific example for a machine code whose instructions are always 32 bits long.[11]:?299? The general type of instruction is given by the op (operation) field, the highest 6 bits. J-type (jump) and I-type (immediate) instructions are fully specified by op. R-type (register) instructions include an additional field funct to determine the exact operation. The fields used in these types are:

   6      5     5     5     5      6 bits
[  op  |  rs |  rt |  rd |shamt| funct]  R-type
[  op  |  rs |  rt | address/immediate]  I-type
[  op  |        target address        ]  J-type

rs, rt, and rd indicate register operands; shamt gives a shift amount; and the address or immediate fields contain an operand directly.[11]:?299–301?

For example, adding the registers 1 and 2 and placing the result in register 6 is encoded:[11]:?554?

[  op  |  rs |  rt |  rd |shamt| funct]
    0     1     2     6     0     32     decimal
 000000 00001 00010 00110 00000 100000   binary

Load a value into register 8, taken from the memory cell 68 cells after the location listed in register 3:[11]:?552?

[  op  |  rs |  rt | address/immediate]
   35     3     8           68           decimal
 100011 00011 01000 00000 00001 000100   binary

Jumping to the address 1024:[11]:?552?

[  op  |        target address        ]
    2                 1024               decimal
 000010 00000 00000 00000 10000 000000   binary

Overlapping instructions

[edit]

On processor architectures with variable-length instruction sets[12] (such as Intel's x86 processor family) it is, within the limits of the control-flow resynchronizing phenomenon known as the Kruskal count,[13][12][14][15][16] sometimes possible through opcode-level programming to deliberately arrange the resulting code so that two code paths share a common fragment of opcode sequences.[nb 3] These are called overlapping instructions, overlapping opcodes, overlapping code, overlapped code, instruction scission, or jump into the middle of an instruction.[17][18][19]

In the 1970s and 1980s, overlapping instructions were sometimes used to preserve memory space. One example were in the implementation of error tables in Microsoft's Altair BASIC, where interleaved instructions mutually shared their instruction bytes.[20][12][17] The technique is rarely used today, but might still be necessary to resort to in areas where extreme optimization for size is necessary on byte-level such as in the implementation of boot loaders which have to fit into boot sectors.[nb 4]

It is also sometimes used as a code obfuscation technique as a measure against disassembly and tampering.[12][15]

The principle is also used in shared code sequences of fat binaries which must run on multiple instruction-set-incompatible processor platforms.[nb 3]

This property is also used to find unintended instructions called gadgets in existing code repositories and is used in return-oriented programming as alternative to code injection for exploits such as return-to-libc attacks.[21][12]

Relationship to microcode

[edit]

In some computers, the machine code of the architecture is implemented by an even more fundamental underlying layer called microcode, providing a common machine language interface across a line or family of different models of computer with widely different underlying dataflows. This is done to facilitate porting of machine language programs between different models.[22] An example of this use is the IBM System/360 family of computers and their successors.[23]

Relationship to bytecode

[edit]

Machine code is generally different from bytecode (also known as p-code), which is either executed by an interpreter or itself compiled into machine code for faster (direct) execution. An exception is when a processor is designed to use a particular bytecode directly as its machine code, such as is the case with Java processors.

Machine code and assembly code are sometimes called native code when referring to platform-dependent parts of language features or libraries.[24]

Storing in memory

[edit]

From the point of view of the CPU, machine code is stored in RAM, but is typically also kept in a set of caches for performance reasons. There may be different caches for instructions and data, depending on the architecture.[25]

In some systems, from the point of view of a process, the machine code lives in code space, a designated part of its address space. In a multi-threading environment, different threads of one process share code space along with data space, which reduces the overhead of context switching considerably as compared to process switching.[26]

The CPU knows what machine code to execute, based on its internal program counter.[27] The program counter points to a memory address and is changed based on special instructions which may cause programmatic branches.[28] The program counter is typically set to a hard coded value when the CPU is first powered on, and will hence execute whatever machine code happens to be at this address.[29]

Similarly, the program counter can be set to execute whatever machine code is at some arbitrary address, even if this is not valid machine code.[28] This will typically trigger an architecture specific protection fault.[30]

In a paging based system, the CPU is oftentimes told if the current page actually holds machine code by an execute bit — pages have multiple such permission bits (readable, writable, etc.) for various housekeeping functionality.[30] E.g. on Unix-like systems memory pages can be toggled to be executable with the mprotect() system call,[31] and on Windows, VirtualProtect() can be used to achieve a similar result.[32] If an attempt is made to execute machine code on a non-executable page, an architecture specific fault will typically occur.[30]

Similarly, in a segment based system, segment descriptors can indicate whether a segment can contain executable code and in what rings that code can run.[33]

In systems that lack this kind of protection, treating data as machine code, or finding new ways to use existing machine code, by various techniques, is the basis of some software exploits. For example, in Super Mario Bros. 3, manipulating the game's memory to resemble a jump instruction then forcing the game to execute that memory as code allows the player to win the game instantly.[34]

Readability by humans

[edit]

Machine code can be seen as a set of electrical pulses that make the instructions readable to the computer; it is not readable by humans,[35] with Douglas Hofstadter comparing it to examining the atoms of a DNA molecule.[36] However, various tools and methods exist to decode machine code to human-readable source code. One such method is disassembly, which easily decodes it back to its corresponding assembly language source code because assembly language forms a one-to-one mapping to machine code.[37]

Machine code may also be decoded to high-level language under two conditions. The first condition is to accept an obfuscated reading of the source code. An obfuscated version of source code is displayed if the machine code is sent to a decompiler of the source language. The second condition requires the machine code to have information about the source code encoded within. The information includes a symbol table that contains debug symbols. The symbol table may be stored within the executable, or it may exist in separate files. A debugger can then read the symbol table to help the programmer interactively debug the machine code in execution.

See also

[edit]

Notes

[edit]
  1. ^ On nonbinary machines it is, e.g., a decimal representation.
  2. ^ On early decimal machines, patterns of characters, digits and digit sign
  3. ^ a b While overlapping instructions on processor architectures with variable-length instruction sets can sometimes be arranged to merge different code paths back into one through control-flow resynchronization, overlapping code for different processor architectures can sometimes also be crafted to cause execution paths to branch into different directions depending on the underlying processor, as is sometimes used in fat binaries.
  4. ^ For example, the DR-DOS master boot records (MBRs) and boot sectors (which also hold the partition table and BIOS Parameter Block, leaving less than 446 respectively 423 bytes for the code) were traditionally able to locate the boot file in the FAT12 or FAT16 file system by themselves and load it into memory as a whole, in contrast to their counterparts in MS-DOS and PC DOS, which instead rely on the system files to occupy the first two directory entry locations in the file system and the first three sectors of IBMBIO.COM to be stored at the start of the data area in contiguous sectors containing a secondary loader to load the remainder of the file into memory (requiring SYS to take care of all these conditions). When FAT32 and logical block addressing (LBA) support was added, Microsoft even switched to require i386 instructions and split the boot code over two sectors for code size reasons, which was no option to follow for DR-DOS as it would have broken backward- and cross-compatibility with other operating systems in multi-boot and chain load scenarios, and as with older IBM PC–compatible PCs. Instead, the DR-DOS 7.07 boot sectors resorted to self-modifying code, opcode-level programming in machine language, controlled utilization of (documented) side effects, multi-level data/code overlapping and algorithmic folding techniques to still fit everything into a physical sector of only 512 bytes without giving up any of their extended functions.

References

[edit]
  1. ^ Stallings, William (2015). Computer Organization and Architecture 10th edition. Pearson Prentice Hall. p. 776. ISBN 9789332570405.
  2. ^ a b c Tanenbaum 1990, p. 251
  3. ^ Tanenbaum 1990, p. 162
  4. ^ Tanenbaum 1990, p. 231
  5. ^ Tanenbaum 1990, p. 237
  6. ^ Tanenbaum 1990, p. 236
  7. ^ a b Tanenbaum 1990, p. 253
  8. ^ Tanenbaum 1990, p. 283
  9. ^ Dourish, Paul (2004). Where the Action is: The Foundations of Embodied Interaction. MIT Press. p. 7. ISBN 0-262-54178-5. Retrieved 2025-08-06.
  10. ^ Zaks, Rodnay (1982). Programming the Z80 (Third Revised ed.). Sybex. pp. 67, 120, 609. ISBN 0-89588-094-6. Retrieved 2025-08-06.
  11. ^ a b c d e Harris, David; Harris, Sarah L. (2007). Digital Design and Computer Architecture. Morgan Kaufmann Publishers. ISBN 978-0-12-370497-9. Retrieved 2025-08-06.
  12. ^ a b c d e Jacob, Matthias; Jakubowski, Mariusz H.; Venkatesan, Ramarathnam [at Wikidata] (20–21 September 2007). Towards Integral Binary Execution: Implementing Oblivious Hashing Using Overlapped Instruction Encodings (PDF). Proceedings of the 9th workshop on Multimedia & Security (MM&Sec '07). Dallas, Texas, US: Association for Computing Machinery. pp. 129–140. CiteSeerX 10.1.1.69.5258. doi:10.1145/1288869.1288887. ISBN 978-1-59593-857-2. S2CID 14174680. Archived (PDF) from the original on 2025-08-06. Retrieved 2025-08-06. (12 pages)
  13. ^ Lagarias, Jeffrey "Jeff" Clark; Rains, Eric Michael; Vanderbei, Robert J. (2009) [2025-08-06]. "The Kruskal Count". In Brams, Stephen; Gehrlein, William V.; Roberts, Fred S. (eds.). The Mathematics of Preference, Choice and Order. Studies in Choice and Welfare. Berlin / Heidelberg, Germany: Springer-Verlag. pp. 371–391. arXiv:math/0110143. doi:10.1007/978-3-540-79128-7_23. ISBN 978-3-540-79127-0. (22 pages)
  14. ^ Andriesse, Dennis; Bos, Herbert [at Wikidata] (2025-08-06). Written at Vrije Universiteit Amsterdam, Amsterdam, Netherlands. Dietrich, Sven (ed.). Instruction-Level Steganography for Covert Trigger-Based Malware (PDF). 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Lecture Notes in Computer Science. Egham, UK; Switzerland: Springer International Publishing. pp. 41–50 [45]. doi:10.1007/978-3-319-08509-8_3. eISSN 1611-3349. ISBN 978-3-31908508-1. ISSN 0302-9743. S2CID 4634611. LNCS 8550. Archived (PDF) from the original on 2025-08-06. Retrieved 2025-08-06. (10 pages)
  15. ^ a b Jakubowski, Mariusz H. (February 2016). "Graph Based Model for Software Tamper Protection". Microsoft. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  16. ^ J?mthagen, Christopher (November 2016). On Offensive and Defensive Methods in Software Security (PDF) (Thesis). Lund, Sweden: Department of Electrical and Information Technology, Lund University. p. 96. ISBN 978-91-7623-942-1. ISSN 1654-790X. Archived (PDF) from the original on 2025-08-06. Retrieved 2025-08-06. (1+xvii+1+152 pages)
  17. ^ a b "Unintended Instructions on x86". Hacker News. 2021. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  18. ^ Kinder, Johannes (2025-08-06). Static Analysis of x86 Executables [Statische Analyse von Programmen in x86 Maschinensprache] (PDF) (Dissertation). Munich, Germany: Technische Universit?t Darmstadt. D17. Archived from the original on 2025-08-06. Retrieved 2025-08-06. (199 pages)
  19. ^ "What is "overlapping instructions" obfuscation?". Reverse Engineering Stack Exchange. 2025-08-06. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  20. ^ Gates, William "Bill" Henry, Personal communication (NB. According to Jacob et al.)
  21. ^ Shacham, Hovav (2007). The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) (PDF). Proceedings of the ACM, CCS 2007. ACM Press. Archived (PDF) from the original on 2025-08-06. Retrieved 2025-08-06.
  22. ^ Kent, Allen; Williams, James G. (2025-08-06). Encyclopedia of Computer Science and Technology: Volume 28 - Supplement 13: AerosPate Applications of Artificial Intelligence to Tree Structures. CRC Press. pp. 33–34. ISBN 978-0-8247-2281-4.
  23. ^ Tucker, S. G. (2025-08-06). "Microprogram control for SYSTEM/360". IBM Systems Journal. 6 (4): 222–241. doi:10.1147/sj.64.0222. ISSN 0018-8670 – via IEEE Xplore.
  24. ^ Gregory, Kate (2025-08-06). "Managed, Unmanaged, Native: What Kind of Code Is This?". Developer.com. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  25. ^ Su, Chao; Zeng, Qingkai (2021). "Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures". Security and Communication Networks. 2021 (1): 5559552. doi:10.1155/2021/5559552. ISSN 1939-0122.
  26. ^ "CS 537 Notes, Section #3A: Processes and Threads". pages.cs.wisc.edu. School of Computer, Data & Information Sciences, University of Wisconsin-Madison. Retrieved 2025-08-06.
  27. ^ Hayes, John Patrick (1978). Computer Architecture and Organization. McGraw-Hill. p. 245. ISBN 978-0-07-027363-4.
  28. ^ a b Principles of Operation, Type 701 and Associated Equipment (PDF). IBM. 1953. pp. 23–24.
  29. ^ Bates, Martin (2025-08-06). PIC Microcontrollers: An Introduction to Microelectronics. Elsevier. p. 30. ISBN 978-0-08-096911-4.
  30. ^ a b c Intel? 64 and IA-32 Architectures Software Developer's Manual, Volume 3A: System Programming Guide, Part 1 (PDF). Intel. September 2016. pp. 4-31 – 4-32, 5-2 – 5-3.
  31. ^ "mprotect(2) - Linux manual page". www.man7.org. Retrieved 2025-08-06.
  32. ^ karl-bridge-microsoft. "VirtualProtect function (memoryapi.h) - Win32 apps". learn.microsoft.com. Retrieved 2025-08-06.
  33. ^ Daniel Tabak (1995). Advanced microprocessors. Internet Archive. McGraw-Hill. p. 149. ISBN 978-0-07-062843-4.
  34. ^ Retro Game Mechanics Explained (2025-08-06). Super Mario Bros. 3 - Wrong Warp. Retrieved 2025-08-06 – via YouTube.
  35. ^ Samuelson 1984, p. 683.
  36. ^ Hofstadter 1979, p. 290.
  37. ^ Tanenbaum 1990, p. 398.
  38. ^ "Associated Data Architecture". High Level Assembler and Toolkit Feature.
  39. ^ "Associated data file output" (PDF). High Level Assembler for z/OS & z/VM & z/VSE - 1.6 -HLASM Programmer's Guide (PDF) (Eighth ed.). IBM. October 2022. pp. 278–332. SC26-4941-07. Retrieved 2025-08-06.
  40. ^ "COBOL SYSADATA file contents". Enterprise COBOL for z/OS.
  41. ^ "SYSADATA message information". Enterprise PL/I for z/OS 6.1 information. 2025-08-06.
  42. ^ "Appendix C. Generalized object file format (GOFF)" (PDF). z/OS - 3.1 - MVS Program Management: Advanced Facilities (PDF). IBM. 2025-08-06. pp. 201–240. SA23-1392-60. Retrieved 2025-08-06.
  43. ^ "Symbols for Windows debugging". Microsoft Learn. 2025-08-06.
  44. ^ "Querying the .Pdb File". Microsoft Learn. 2025-08-06.

Sources

[edit]

Further reading

[edit]
反酸是什么感觉 感冒看什么科 什么军官可以随身配枪 血小板计数高是什么原因 痉挛是什么意思啊
净身是什么意思 sp是什么意思啊 八字桃花是什么意思 花木兰属什么生肖 一级军士长相当于什么级别
一个牙一个合是什么字 包皮嵌顿是什么 蜂蜜对人体有什么好处和功效 万象更新是什么意思 颂字五行属什么
肾上腺是什么意思 蝙蝠属于什么类 大学有什么专业适合女生 射手座和什么座最配对 淋巴细胞百分比偏高是什么原因
背锅侠是什么意思chuanglingweilai.com 舌头下面的筋叫什么hcv8jop3ns2r.cn 睡觉多梦是什么原因引起的hcv7jop9ns4r.cn 胃粘膜损伤吃什么药wuhaiwuya.com 渝北区有什么好玩的地方hcv7jop5ns4r.cn
闭关修炼是什么意思hlguo.com 黄精什么时候种植sanhestory.com 纹身有什么讲究和忌讳hcv8jop5ns7r.cn 84年什么命hcv8jop3ns2r.cn 脸为什么容易红hcv8jop7ns3r.cn
胎盘位于子宫前壁是什么意思hcv8jop6ns1r.cn 怀孕有褐色分泌物是什么原因hcv9jop4ns1r.cn 梅毒有什么症状hcv8jop8ns3r.cn 老睡不着觉是什么原因hcv9jop2ns5r.cn 1998年什么命hcv9jop4ns3r.cn
什么是肾虚hcv9jop4ns3r.cn 你要干什么wuhaiwuya.com 白龙马叫什么hcv9jop0ns5r.cn 广西是什么族hcv8jop9ns8r.cn 冬瓜与什么食物相克hcv9jop2ns6r.cn
百度