天秤座男生喜欢什么样的女生| 吃什么能长高| 百鸟朝凤是什么生肖| 什么是水印照片| 7.17什么星座| 肾结石是什么原因造成的| 生理期提前是什么原因| 知性女性是什么意思| 棕色用什么颜色调出来| 吃什么奶水多| 指南针是什么时候发明的| 海淘是什么意思啊| 精子有点黄是什么原因| 兔子不吃窝边草是什么生肖| 肺结节是什么病严重吗| 舍是什么结构| 四肢抽搐口吐白沫是什么病| 一叶一菩提一花一世界什么意思| 师夷长技以制夷是什么意思| 口下面一个巴念什么| 什么是情感| 严惩不贷是什么意思| 落日余晖什么意思| 四月二十五是什么星座| 古惑仔是什么| 照猫画虎什么意思| 后背麻木是什么原因| 什么的鼻子填词形容词| 维生素a是什么| 男性查hpv挂什么科| 黑色粑粑是什么原因| 孕妇查凝血是检查什么| 水晶粉是什么粉| 牛肉炒什么好吃| 闪点什么意思| mido手表什么档次| 经常头痛吃什么药效果好| 曹洪是曹操的什么人| 哈密瓜是什么季节的水果| cip号是什么| 辛属什么五行| 鸦片鱼又叫什么鱼| 尊巴是什么| 董事长是什么职位| 一直不射精是什么原因| 一阴一阳是什么数字| 淋症是什么意思| 什么星空| 天公作美是什么生肖| 费玉清为什么不结婚| 626什么意思| 盛世美颜是什么意思| 头顶冒汗是什么原因| 三sprit是什么牌子| 女女叫什么| 嗓子痒是什么原因| 什么是视同缴费| 精液带血是什么原因| 林檎是什么意思| 师级干部是什么级别| 大腿疼是什么原因| 再生障碍性贫血是什么病| ao是什么意思| 终而复始什么意思| 腿部肿胀是什么原因引起的| 左什么结构| 黄片是什么| 肿瘤标志物是什么| 沙发客是什么意思| 1846什么意思| 小腹疼是什么原因| 脾虚湿气重吃什么好| 什么叫多巴胺| 黄酒有什么功效与作用| 此地无银三百两什么意思| hcg低是什么原因| 春天的雨是什么| 广肚是什么| 脚脖子浮肿是什么原因引起的| 63岁属什么| 麻疹是什么病| 城市户口和农村户口有什么区别| 互粉是什么意思| 小鱼吃什么食物| 股票的量比是什么意思| 07是什么生肖| 888红包代表什么意思| 6月6号是什么星座| 1r是什么意思| 心颤是什么症状| 烤鸭为什么那么便宜| 啾啾是什么意思| 湿疹吃什么食物好得快| 节律是什么意思| 那悲歌总会在梦中惊醒是什么歌| 什么精神成语| 乙酰胆碱的作用是什么| 99新是什么意思| 吃什么长内膜| newear是什么牌子| 什么东西人们都不喜欢吃| 额窦炎吃什么药效果好| 右肾小结石是什么意思| 左腿疼是什么原因| 左心室高电压是什么意思| 黎山老母什么级别神仙| 高沫是什么茶| 全身检查要挂什么科| 主胰管不扩张是什么意思| 大量出汗是什么原因| 心下痞是什么意思| 长的像蛇的鱼是什么鱼| 眼压高是什么意思| 隔夜茶为什么不能喝| ecom什么意思| 12朵玫瑰代表什么意思| 炮烙之刑是什么意思| 小处男是什么意思| 内退是什么意思| 为什么新疆人长得像外国人| 上夜班吃什么对身体好| 口腔医学技术是什么| 血压低有什么症状| 乐山大佛是什么佛| 右侧肋骨下方是什么器官| 甲状腺囊肿不能吃什么| 天秤座女生什么性格| 张衡发明了什么东西| 女生吃什么可以丰胸| 痛风吃什么水果最好| 牛皮癣是什么样的| 世界杯什么时候开始| design是什么牌子| 骨刺吃什么药| 什么叫三无产品| 头发有点黄是什么原因| 什么叫强迫症| 2003年属羊的是什么命| 吊兰开花有什么兆头| 39什么意思| 什么旺土| 左侧上颌窦囊肿是什么意思| 不什么不什么的四字词语| 半夜饿了吃什么不长胖| 月经期间适合吃什么| 花儿为什么这样红歌词| 小孩晚上睡不着是什么原因| 大脚骨疼是什么原因| 什么药溶血栓最好| 下午两点属于什么时辰| 束手无策是什么意思| 羽军念什么| 雨中漫步是什么意思| 手指关节疼痛用什么药| 智是什么意思| 肺气虚吃什么中成药| 团长一般是什么军衔| 什么的怀抱| 地贫有什么症状| ta代表什么| 电器发生火灾用什么灭火器| 频繁是什么意思| 县宣传部长是什么级别| 什么是地包天牙齿| 什么泡酒让性功能最强| 北极为什么没有企鹅| 越南讲什么语言| 嗜酸性粒细胞是什么| 正财透干是什么意思| 计算机二级什么时候考| 愣头青是什么意思| 什么啊| 血糖高的人吃什么主食| 借鸡生蛋是什么意思| 脊柱炎是什么症状| 甲虫吃什么食物| 发烧看什么科室| 男人忽冷忽热说明什么| 不忘初心方得始终是什么意思| 三班倒是什么意思| 如何查自己是什么命格| 多囊卵巢综合症有什么症状| 烤鱼什么鱼好吃| cta是什么检查| 但微颔之的之是什么意思| 小孩喉咙发炎吃什么药好| 5月23号是什么星座| 气喘是什么原因| 什么叫高血脂| 四月二十九是什么星座| 肾结石不处理有什么后果| 什么时候看到的月亮最大| 疗养是什么意思| 什么病可以请长假| 人体七大营养素是什么| 常喝黑苦荞茶有什么好处| 补血吃什么好| 独角戏什么意思| 9月21号是什么日子| 乳腺增生看什么科室| 七个星期五什么档次| 什么是神经衰弱| 什么是真菌感染| 钾偏低是什么原因| 盆腔积液用什么药| 眼睛干涩发痒用什么药| 消融术是什么手术| 长期不过性生活有什么危害| 焦俊艳和焦恩俊是什么关系| 湿气重吃什么调理| 素女经是什么| 花儿为什么这样红歌词| 公道自在人心是什么意思| 蛇信子是什么| anker是什么牌子| 什么是官方旗舰店| 歧途什么意思| 青稞是什么东西| 提报是什么意思| 什么叫做原发性高血压| 川字属于五行属什么| 幽门杆菌是什么意思| 什么是钓鱼网站| 子宫肌瘤钙化是什么意思| 什么床不能睡觉| cpi指数是什么意思| 着了过是什么词| 大便干燥是什么原因| 斑秃去医院挂什么科| 金刚菩提是什么植物的种子| 中国梦是什么梦| 五行中什么生木| 1996年属什么| 藏干是什么意思| 什么药去湿气最好最快| 什么是碱| 豆角和什么不能一起吃| 被蚊子咬了涂什么| 孩子为什么说话迟| 二五八万是什么意思| 老匹夫是什么意思| 阿玛尼是什么品牌| 守望相助是什么意思| 不讲武德什么意思| 开塞露用多了有什么副作用| 孩提是什么意思| 孩子拉肚子吃什么药| PPm什么意思| 黄精泡酒有什么功效| 11月25日什么星座| 酒量越来越差什么原因| 增生期子宫内膜是什么意思| 下肢水肿挂什么科| 原始心管搏动是什么意思| 离婚需要带什么证件| 人中白是什么| 痛风吃什么蔬菜好| 冉是什么意思| 喝什么茶能降低血糖| 骨髓捐赠对自己有什么影响没有| 干什么最赚钱| 医院规培生是什么意思| 什么不什么干| 眼屎多用什么眼药水好| 百度

中海物业缓速扩张,上市两年管理规模终于突破一亿平

百度 随后带他到南阳市眼科医院做眼部检查,经过医生的测试检查被告知嘉琪右眼已经失明,医生建议做眼部b超。

In computer programming, machine code is computer code consisting of machine language instructions, which are used to control a computer's central processing unit (CPU). For conventional binary computers, machine code is the binary[nb 1] representation of a computer program that is actually read and interpreted by the computer. A program in machine code consists of a sequence of machine instructions (possibly interspersed with data).[1]

Machine language monitor running on a W65C816S microprocessor, displaying code disassembly and dumps of processor register and memory

Each machine code instruction causes the CPU to perform a specific task. Examples of such tasks include:

  1. Load a word from memory to a CPU register
  2. Execute an arithmetic logic unit (ALU) operation on one or more registers or memory locations
  3. Jump or skip to an instruction that is not the next one

In general, each architecture family (e.g., x86, ARM) has its own instruction set architecture (ISA), and hence its own specific machine code language. There are exceptions, such as the VAX architecture, which includes optional support of the PDP-11 instruction set; the IA-64 architecture, which includes optional support of the IA-32 instruction set; and the PowerPC 615 microprocessor, which can natively process both PowerPC and x86 instruction sets.

Machine code is a strictly numerical language, and it is the lowest-level interface to the CPU intended for a programmer. Assembly language provides a direct map between the numerical machine code and a human-readable mnemonic. In assembly, numerical machine code opcodes and operands are replaced with mnemonics and labels. For example, the x86 architecture has available the 0x90 opcode; it is represented as NOP in the assembly source code. While it is possible to write programs directly in machine code, managing individual bits and calculating numerical addresses is tedious and error-prone. Therefore, programs are rarely written directly in machine code. However, an existing machine code program may be edited if the assembly source code is not available.

The majority of programs today are written in a high-level language. A high-level program may be translated into machine code by a compiler.

Instruction set

edit

Every processor or processor family has its own instruction set. Machine instructions are patterns of bits[nb 2] that specify some particular action.[2] An instruction set is described by its instruction format. Some ways in which instruction formats may differ:[2]

  • all instructions may have the same length or instructions may have different lengths;
  • the number of instructions may be small or large;
  • instructions may or may not align with the architecture's word length.

A processor's instruction set needs to execute the circuits of a computer's digital logic level. At the digital level, the program needs to control the computer's registers, bus, memory, ALU, and other hardware components.[3] To control a computer's architectural features, machine instructions are created. Examples of features that are controlled using machine instructions:

The criteria for instruction formats include:

  • Instructions most commonly used should be shorter than instructions rarely used.[2]
  • The memory transfer rate of the underlying hardware determines the flexibility of the memory fetch instructions.
  • The number of bits in the address field requires special consideration.[7]

Determining the size of the address field is a choice between space and speed.[7] On some computers, the number of bits in the address field may be too small to access all of the physical memory. Also, virtual address space needs to be considered. Another constraint may be a limitation on the size of registers used to construct the address. Whereas a shorter address field allows the instructions to execute more quickly, other physical properties need to be considered when designing the instruction format.

Instructions can be separated into two types: general-purpose and special-purpose. Special-purpose instructions exploit architectural features that are unique to a computer. General-purpose instructions control architectural features common to all computers.[8]

General-purpose instructions control:

  • Data movement from one place to another
  • Monadic operations that have one operand to produce a result
  • Dyadic operations that have two operands to produce a result
  • Comparisons and conditional jumps
  • Procedure calls
  • Loop control
  • Input/output

Assembly languages

edit
 
Translation of assembly language into machine language

A much more human-friendly rendition of machine language, named assembly language, uses mnemonic codes to refer to machine code instructions, rather than using the instructions' numeric values directly, and uses symbolic names to refer to storage locations and sometimes registers.[9] For example, on the Zilog Z80 processor, the machine code 00000101, which causes the CPU to decrement the B general-purpose register, would be represented in assembly language as DEC B.[10]

Examples

edit

IBM 709x

edit

The IBM 704, 709, 704x and 709x store one instruction in each instruction word; IBM numbers the bit from the left as S, 1, ..., 35. Most instructions have one of two formats:

Generic
S,1-11
12-13 Flag, ignored in some instructions
14-17 unused
18-20 Tag
21-35 Y
Index register control, other than TSX
S,1-2 Opcode
3-17 Decrement
18-20 Tag
21-35 Y

For all but the IBM 7094 and 7094 II, there are three index registers designated A, B and C; indexing with multiple 1 bits in the tag subtracts the logical or of the selected index registers and loading with multiple 1 bits in the tag loads all of the selected index registers. The 7094 and 7094 II have seven index registers, but when they are powered on they are in multiple tag mode, in which they use only the three of the index registers in a fashion compatible with earlier machines, and require a Leave Multiple Tag Mode (LMTM) instruction in order to access the other four index registers.

The effective address is normally Y-C(T), where C(T) is either 0 for a tag of 0, the logical or of the selected index registers in multiple tag mode or the selected index register if not in multiple tag mode. However, the effective address for index register control instructions is just Y.

A flag with both bits 1 selects indirect addressing; the indirect address word has both a tag and a Y field.

In addition to transfer (branch) instructions, these machines have skip instruction that conditionally skip one or two words, e.g., Compare Accumulator with Storage (CAS) does a three way compare and conditionally skips to NSI, NSI+1 or NSI+2, depending on the result.

MIPS

edit

The MIPS architecture provides a specific example for a machine code whose instructions are always 32 bits long.[11]:?299? The general type of instruction is given by the op (operation) field, the highest 6 bits. J-type (jump) and I-type (immediate) instructions are fully specified by op. R-type (register) instructions include an additional field funct to determine the exact operation. The fields used in these types are:

   6      5     5     5     5      6 bits
[  op  |  rs |  rt |  rd |shamt| funct]  R-type
[  op  |  rs |  rt | address/immediate]  I-type
[  op  |        target address        ]  J-type

rs, rt, and rd indicate register operands; shamt gives a shift amount; and the address or immediate fields contain an operand directly.[11]:?299–301?

For example, adding the registers 1 and 2 and placing the result in register 6 is encoded:[11]:?554?

[  op  |  rs |  rt |  rd |shamt| funct]
    0     1     2     6     0     32     decimal
 000000 00001 00010 00110 00000 100000   binary

Load a value into register 8, taken from the memory cell 68 cells after the location listed in register 3:[11]:?552?

[  op  |  rs |  rt | address/immediate]
   35     3     8           68           decimal
 100011 00011 01000 00000 00001 000100   binary

Jumping to the address 1024:[11]:?552?

[  op  |        target address        ]
    2                 1024               decimal
 000010 00000 00000 00000 10000 000000   binary

Overlapping instructions

edit

On processor architectures with variable-length instruction sets[12] (such as Intel's x86 processor family) it is, within the limits of the control-flow resynchronizing phenomenon known as the Kruskal count,[13][12][14][15][16] sometimes possible through opcode-level programming to deliberately arrange the resulting code so that two code paths share a common fragment of opcode sequences.[nb 3] These are called overlapping instructions, overlapping opcodes, overlapping code, overlapped code, instruction scission, or jump into the middle of an instruction.[17][18][19]

In the 1970s and 1980s, overlapping instructions were sometimes used to preserve memory space. One example were in the implementation of error tables in Microsoft's Altair BASIC, where interleaved instructions mutually shared their instruction bytes.[20][12][17] The technique is rarely used today, but might still be necessary to resort to in areas where extreme optimization for size is necessary on byte-level such as in the implementation of boot loaders which have to fit into boot sectors.[nb 4]

It is also sometimes used as a code obfuscation technique as a measure against disassembly and tampering.[12][15]

The principle is also used in shared code sequences of fat binaries which must run on multiple instruction-set-incompatible processor platforms.[nb 3]

This property is also used to find unintended instructions called gadgets in existing code repositories and is used in return-oriented programming as alternative to code injection for exploits such as return-to-libc attacks.[21][12]

Relationship to microcode

edit

In some computers, the machine code of the architecture is implemented by an even more fundamental underlying layer called microcode, providing a common machine language interface across a line or family of different models of computer with widely different underlying dataflows. This is done to facilitate porting of machine language programs between different models.[22] An example of this use is the IBM System/360 family of computers and their successors.[23]

Relationship to bytecode

edit

Machine code is generally different from bytecode (also known as p-code), which is either executed by an interpreter or itself compiled into machine code for faster (direct) execution. An exception is when a processor is designed to use a particular bytecode directly as its machine code, such as is the case with Java processors.

Machine code and assembly code are sometimes called native code when referring to platform-dependent parts of language features or libraries.[24]

Storing in memory

edit

From the point of view of the CPU, machine code is stored in RAM, but is typically also kept in a set of caches for performance reasons. There may be different caches for instructions and data, depending on the architecture.[25]

In some systems, from the point of view of a process, the machine code lives in code space, a designated part of its address space. In a multi-threading environment, different threads of one process share code space along with data space, which reduces the overhead of context switching considerably as compared to process switching.[26]

The CPU knows what machine code to execute, based on its internal program counter.[27] The program counter points to a memory address and is changed based on special instructions which may cause programmatic branches.[28] The program counter is typically set to a hard coded value when the CPU is first powered on, and will hence execute whatever machine code happens to be at this address.[29]

Similarly, the program counter can be set to execute whatever machine code is at some arbitrary address, even if this is not valid machine code.[28] This will typically trigger an architecture specific protection fault.[30]

In a paging based system, the CPU is oftentimes told if the current page actually holds machine code by an execute bit — pages have multiple such permission bits (readable, writable, etc.) for various housekeeping functionality.[30] E.g. on Unix-like systems memory pages can be toggled to be executable with the mprotect() system call,[31] and on Windows, VirtualProtect() can be used to achieve a similar result.[32] If an attempt is made to execute machine code on a non-executable page, an architecture specific fault will typically occur.[30]

Similarly, in a segment based system, segment descriptors can indicate whether a segment can contain executable code and in what rings that code can run.[33]

In systems that lack this kind of protection, treating data as machine code, or finding new ways to use existing machine code, by various techniques, is the basis of some software exploits. For example, in Super Mario Bros. 3, manipulating the game's memory to resemble a jump instruction then forcing the game to execute that memory as code allows the player to win the game instantly.[34]

Readability by humans

edit

Machine code can be seen as a set of electrical pulses that make the instructions readable to the computer; it is not readable by humans,[35] with Douglas Hofstadter comparing it to examining the atoms of a DNA molecule.[36] However, various tools and methods exist to decode machine code to human-readable source code. One such method is disassembly, which easily decodes it back to its corresponding assembly language source code because assembly language forms a one-to-one mapping to machine code.[37]

Machine code may also be decoded to high-level language under two conditions. The first condition is to accept an obfuscated reading of the source code. An obfuscated version of source code is displayed if the machine code is sent to a decompiler of the source language. The second condition requires the machine code to have information about the source code encoded within. The information includes a symbol table that contains debug symbols. The symbol table may be stored within the executable, or it may exist in separate files. A debugger can then read the symbol table to help the programmer interactively debug the machine code in execution.

See also

edit

Notes

edit
  1. ^ On nonbinary machines it is, e.g., a decimal representation.
  2. ^ On early decimal machines, patterns of characters, digits and digit sign
  3. ^ a b While overlapping instructions on processor architectures with variable-length instruction sets can sometimes be arranged to merge different code paths back into one through control-flow resynchronization, overlapping code for different processor architectures can sometimes also be crafted to cause execution paths to branch into different directions depending on the underlying processor, as is sometimes used in fat binaries.
  4. ^ For example, the DR-DOS master boot records (MBRs) and boot sectors (which also hold the partition table and BIOS Parameter Block, leaving less than 446 respectively 423 bytes for the code) were traditionally able to locate the boot file in the FAT12 or FAT16 file system by themselves and load it into memory as a whole, in contrast to their counterparts in MS-DOS and PC DOS, which instead rely on the system files to occupy the first two directory entry locations in the file system and the first three sectors of IBMBIO.COM to be stored at the start of the data area in contiguous sectors containing a secondary loader to load the remainder of the file into memory (requiring SYS to take care of all these conditions). When FAT32 and logical block addressing (LBA) support was added, Microsoft even switched to require i386 instructions and split the boot code over two sectors for code size reasons, which was no option to follow for DR-DOS as it would have broken backward- and cross-compatibility with other operating systems in multi-boot and chain load scenarios, and as with older IBM PC–compatible PCs. Instead, the DR-DOS 7.07 boot sectors resorted to self-modifying code, opcode-level programming in machine language, controlled utilization of (documented) side effects, multi-level data/code overlapping and algorithmic folding techniques to still fit everything into a physical sector of only 512 bytes without giving up any of their extended functions.

References

edit
  1. ^ Stallings, William (2015). Computer Organization and Architecture 10th edition. Pearson Prentice Hall. p. 776. ISBN 9789332570405.
  2. ^ a b c Tanenbaum 1990, p. 251
  3. ^ Tanenbaum 1990, p. 162
  4. ^ Tanenbaum 1990, p. 231
  5. ^ Tanenbaum 1990, p. 237
  6. ^ Tanenbaum 1990, p. 236
  7. ^ a b Tanenbaum 1990, p. 253
  8. ^ Tanenbaum 1990, p. 283
  9. ^ Dourish, Paul (2004). Where the Action is: The Foundations of Embodied Interaction. MIT Press. p. 7. ISBN 0-262-54178-5. Retrieved 2025-08-06.
  10. ^ Zaks, Rodnay (1982). Programming the Z80 (Third Revised ed.). Sybex. pp. 67, 120, 609. ISBN 0-89588-094-6. Retrieved 2025-08-06.
  11. ^ a b c d e Harris, David; Harris, Sarah L. (2007). Digital Design and Computer Architecture. Morgan Kaufmann Publishers. ISBN 978-0-12-370497-9. Retrieved 2025-08-06.
  12. ^ a b c d e Jacob, Matthias; Jakubowski, Mariusz H.; Venkatesan, Ramarathnam [at Wikidata] (20–21 September 2007). Towards Integral Binary Execution: Implementing Oblivious Hashing Using Overlapped Instruction Encodings (PDF). Proceedings of the 9th workshop on Multimedia & Security (MM&Sec '07). Dallas, Texas, US: Association for Computing Machinery. pp. 129–140. CiteSeerX 10.1.1.69.5258. doi:10.1145/1288869.1288887. ISBN 978-1-59593-857-2. S2CID 14174680. Archived (PDF) from the original on 2025-08-06. Retrieved 2025-08-06. (12 pages)
  13. ^ Lagarias, Jeffrey "Jeff" Clark; Rains, Eric Michael; Vanderbei, Robert J. (2009) [2025-08-06]. "The Kruskal Count". In Brams, Stephen; Gehrlein, William V.; Roberts, Fred S. (eds.). The Mathematics of Preference, Choice and Order. Studies in Choice and Welfare. Berlin / Heidelberg, Germany: Springer-Verlag. pp. 371–391. arXiv:math/0110143. doi:10.1007/978-3-540-79128-7_23. ISBN 978-3-540-79127-0. (22 pages)
  14. ^ Andriesse, Dennis; Bos, Herbert [at Wikidata] (2025-08-06). Written at Vrije Universiteit Amsterdam, Amsterdam, Netherlands. Dietrich, Sven (ed.). Instruction-Level Steganography for Covert Trigger-Based Malware (PDF). 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Lecture Notes in Computer Science. Egham, UK; Switzerland: Springer International Publishing. pp. 41–50 [45]. doi:10.1007/978-3-319-08509-8_3. eISSN 1611-3349. ISBN 978-3-31908508-1. ISSN 0302-9743. S2CID 4634611. LNCS 8550. Archived (PDF) from the original on 2025-08-06. Retrieved 2025-08-06. (10 pages)
  15. ^ a b Jakubowski, Mariusz H. (February 2016). "Graph Based Model for Software Tamper Protection". Microsoft. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  16. ^ J?mthagen, Christopher (November 2016). On Offensive and Defensive Methods in Software Security (PDF) (Thesis). Lund, Sweden: Department of Electrical and Information Technology, Lund University. p. 96. ISBN 978-91-7623-942-1. ISSN 1654-790X. Archived (PDF) from the original on 2025-08-06. Retrieved 2025-08-06. (1+xvii+1+152 pages)
  17. ^ a b "Unintended Instructions on x86". Hacker News. 2021. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  18. ^ Kinder, Johannes (2025-08-06). Static Analysis of x86 Executables [Statische Analyse von Programmen in x86 Maschinensprache] (PDF) (Dissertation). Munich, Germany: Technische Universit?t Darmstadt. D17. Archived from the original on 2025-08-06. Retrieved 2025-08-06. (199 pages)
  19. ^ "What is "overlapping instructions" obfuscation?". Reverse Engineering Stack Exchange. 2025-08-06. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  20. ^ Gates, William "Bill" Henry, Personal communication (NB. According to Jacob et al.)
  21. ^ Shacham, Hovav (2007). The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) (PDF). Proceedings of the ACM, CCS 2007. ACM Press. Archived (PDF) from the original on 2025-08-06. Retrieved 2025-08-06.
  22. ^ Kent, Allen; Williams, James G. (2025-08-06). Encyclopedia of Computer Science and Technology: Volume 28 - Supplement 13: AerosPate Applications of Artificial Intelligence to Tree Structures. CRC Press. pp. 33–34. ISBN 978-0-8247-2281-4.
  23. ^ Tucker, S. G. (2025-08-06). "Microprogram control for SYSTEM/360". IBM Systems Journal. 6 (4): 222–241. doi:10.1147/sj.64.0222. ISSN 0018-8670 – via IEEE Xplore.
  24. ^ Gregory, Kate (2025-08-06). "Managed, Unmanaged, Native: What Kind of Code Is This?". Developer.com. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  25. ^ Su, Chao; Zeng, Qingkai (2021). "Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures". Security and Communication Networks. 2021 (1): 5559552. doi:10.1155/2021/5559552. ISSN 1939-0122.
  26. ^ "CS 537 Notes, Section #3A: Processes and Threads". pages.cs.wisc.edu. School of Computer, Data & Information Sciences, University of Wisconsin-Madison. Retrieved 2025-08-06.
  27. ^ Hayes, John Patrick (1978). Computer Architecture and Organization. McGraw-Hill. p. 245. ISBN 978-0-07-027363-4.
  28. ^ a b Principles of Operation, Type 701 and Associated Equipment (PDF). IBM. 1953. pp. 23–24.
  29. ^ Bates, Martin (2025-08-06). PIC Microcontrollers: An Introduction to Microelectronics. Elsevier. p. 30. ISBN 978-0-08-096911-4.
  30. ^ a b c Intel? 64 and IA-32 Architectures Software Developer's Manual, Volume 3A: System Programming Guide, Part 1 (PDF). Intel. September 2016. pp. 4-31 – 4-32, 5-2 – 5-3.
  31. ^ "mprotect(2) - Linux manual page". www.man7.org. Retrieved 2025-08-06.
  32. ^ karl-bridge-microsoft. "VirtualProtect function (memoryapi.h) - Win32 apps". learn.microsoft.com. Retrieved 2025-08-06.
  33. ^ Daniel Tabak (1995). Advanced microprocessors. Internet Archive. McGraw-Hill. p. 149. ISBN 978-0-07-062843-4.
  34. ^ Retro Game Mechanics Explained (2025-08-06). Super Mario Bros. 3 - Wrong Warp. Retrieved 2025-08-06 – via YouTube.
  35. ^ Samuelson 1984, p. 683.
  36. ^ Hofstadter 1979, p. 290.
  37. ^ Tanenbaum 1990, p. 398.
  38. ^ "Associated Data Architecture". High Level Assembler and Toolkit Feature.
  39. ^ "Associated data file output" (PDF). High Level Assembler for z/OS & z/VM & z/VSE - 1.6 -HLASM Programmer's Guide (PDF) (Eighth ed.). IBM. October 2022. pp. 278–332. SC26-4941-07. Retrieved 2025-08-06.
  40. ^ "COBOL SYSADATA file contents". Enterprise COBOL for z/OS.
  41. ^ "SYSADATA message information". Enterprise PL/I for z/OS 6.1 information. 2025-08-06.
  42. ^ "Appendix C. Generalized object file format (GOFF)" (PDF). z/OS - 3.1 - MVS Program Management: Advanced Facilities (PDF). IBM. 2025-08-06. pp. 201–240. SA23-1392-60. Retrieved 2025-08-06.
  43. ^ "Symbols for Windows debugging". Microsoft Learn. 2025-08-06.
  44. ^ "Querying the .Pdb File". Microsoft Learn. 2025-08-06.

Sources

edit

Further reading

edit
7月26是什么星座 1月1号什么星座 阻生智齿是什么意思 野合什么意思 男人性功能太强是什么原因
胃不消化吃什么药 皮试是什么 减肥期间适合喝什么酒 子宫轻度下垂有什么办法恢复 眼睛为什么会长麦粒肿
饭圈什么意思 13太保是什么意思 嘴馋是什么意思 利而不害为而不争是什么意思 在五行中属什么
口腔溃疡反反复复是什么原因 吃什么补气 什么是焦距 甘油三酯什么意思 减肥吃什么水果
祖马龙是什么档次hcv9jop8ns1r.cn 昭字五行属什么yanzhenzixun.com 素质教育是什么hcv7jop5ns5r.cn 深圳属于什么气候hcv8jop0ns9r.cn 串联质谱筛查是什么病hcv8jop8ns3r.cn
996是什么hcv7jop5ns1r.cn 腰不好挂什么科hcv7jop4ns8r.cn 肿瘤前期出现什么症状hcv8jop6ns9r.cn 慢心律又叫什么药hcv9jop0ns1r.cn 因果循环是什么意思hcv8jop9ns2r.cn
拔牙之后吃什么消炎药hcv8jop3ns3r.cn 高氨血症是什么病hcv8jop3ns0r.cn 什么南什么北hcv7jop6ns8r.cn 初级中学是什么意思hcv9jop5ns7r.cn 虐狗什么意思fenrenren.com
舌头发麻是什么原因hcv8jop0ns7r.cn 人流后什么叫重体力活hcv8jop6ns8r.cn 正月二十九是什么星座hcv8jop7ns5r.cn 燕麦色是什么颜色hcv8jop0ns0r.cn 微信英文名叫什么hcv8jop0ns8r.cn
百度