褪黑素有什么作用| 壶承是什么| 干净的近义词是什么| 额头出汗多是什么原因| 嫡母是什么意思| 品牌是什么意思| 孩子感冒咳嗽吃什么药| 紫苏是什么| 胡萝卜什么时候种| 反复发烧挂什么科| bf是什么| 为什么会全身酸痛| 我要的是什么| 虾仁炒什么菜好吃| 吃了西瓜不能吃什么| 福利姬什么意思| 42岁属什么| rsv是什么病毒| 脑梗灶是什么意思| denham是什么牌子| 哀莫大于心死什么意思| 梦到下雪是什么意思| 舌苔重是什么原因| 起什么转什么成语| 什么是哺乳动物| 小兔子吃什么食物| 籽骨是什么意思| 大人是什么意思| 百褶裙配什么鞋子| mg什么单位| 半夜猫叫有什么预兆| 乌龟代表什么数字| 儿童抗o高会引起什么病| 扁平疣是什么样子图片| 庭长是什么级别| 下午3点半是什么时辰| 喝什么茶可以降血脂| amount是什么意思| 2028是什么年| 雪碧喝多了有什么危害| 皮肤干燥是什么原因| 图腾是什么意思| 33是什么意思| 恩怨是什么意思| 张嘴睡觉有什么危害| 白酒优级和一级有什么区别| 中暑喝什么| 公元前3000年是什么朝代| 子午流注是什么意思| 晚上五点是什么时辰| 尿毒症有些什么症状| 眼白发青是什么原因| 了加一笔是什么字| 面部提升紧致做什么效果最好| 办居住证需要什么| 知天命是什么意思| 长命百岁是什么意思| 西游记主题曲叫什么| 掉头发是什么原因导致的| 五官指什么| 喜欢穿黑色衣服的女人是什么性格| 吃面是什么意思| power是什么牌子| 世界上最长的蛇是什么| 临聘人员是什么意思| 阳刃是什么意思| 正月初十是什么星座| 掰手指头响有什么危害| m什么意思| 嘴里有粘液是什么原因| 儿时是什么意思| 舌苔厚腻是什么原因| few是什么意思| 天天洗头发有什么危害| 苋菜是什么菜| 嗜酸性粒细胞是什么| 内消瘰疬丸主治什么病| 干什么挣钱快| 东南角风水代表什么| 人身体缺钾是什么症状| 地震为什么会发生| ppa是什么| 癃闭是什么意思| 唾液酸酶阳性是什么意思| 子宫内膜异位症有什么症状| 什么叫四大皆空| 用什么擦地最干净| 厌氧菌是什么意思| 女人腰酸背痛是什么病| 明目退翳是什么意思| maggie是什么意思| 脑膜炎是什么原因引起的| 什么病需要化疗| 喝什么能补肾| 全麻是什么感觉| 右眼皮跳是什么预兆| 下巴长痘痘是什么原因引起的| 什么是标准预防| 全身出虚汗多是什么原因造成的| 深水炸弹是什么意思| 公因数是什么意思| 耳鸣是什么症状| 上什么下什么| 取鱼刺挂什么科室| 肝内胆管结石吃什么药好| 小便发黄什么原因| 一竖读什么| 尖斌卡引是什么意思| 血栓吃什么药| 大佬什么意思| 玉髓什么颜色最贵| 70年属狗的是什么命| 离宫是什么意思| 身高用什么单位| 肚子疼做什么检查| 牙周炎吃什么药好| 吃辣流鼻涕是什么原因| 我想成为一个什么样的人| 胆五行属什么| 中国梦是什么| 中药学专业学什么| 女人性冷淡吃什么药| 小孩睡觉张开嘴巴是什么原因| 两个方一个土读什么| 金箔是什么| 斜视是什么原因导致的| 嘴唇溃疡是什么原因| 轩尼诗是什么酒| 清宫和人流有什么区别| 1988属什么生肖| p代表什么意思| 肚子肥胖是什么原因引起的| 无家可归是什么生肖| 男性下体瘙痒用什么药| 吴京和吴樾什么关系| 肩膀疼是什么原因引起的| 政治家是什么意思| 山茱萸的功效与作用是什么| 盆腔磁共振平扫能查出什么| 倒车雷达什么牌子好| 早上不晨勃是什么原因| 脆生生是什么意思| 猪沙肝是什么部位| 右位是什么意思| 7月13日是什么日子| 排酸对身体有什么好处| sakose是什么牌子| 咳嗽头晕是什么原因| 外阴起红点是什么病| 浮躁的意思是什么| 六月二十三是什么日子| 不屑一顾的意思是什么| 女性感染梅毒有什么症状| 小龙虾什么季节| kj什么意思| 藏医最擅长治什么病| 乙肝抗体阴性什么意思| 什么叫重本大学| 区域经理的岗位职责是什么| 吃什么补蛋白最快| 贞操锁是什么| 疣挂什么科| 羊是什么结构的字| 牛肉用什么腌制比较嫩| 红红的太阳像什么| 覅什么意思| 一什么柳树| 小便憋不住尿裤子是什么情况| 珠联璧合是什么意思| 打嗝是什么原因引起的| 羊水少了对宝宝有什么影响| 蛇信子是什么| 港式按摩是什么意思| 六月初六什么节| 月经一直不干净是什么原因| 妈妈的奶奶叫什么| 分数是什么| 三点水念什么| 溃疡吃什么药| 血清胃功能检测是什么| 缅怀什么意思| pedro是什么牌子| 什么对什么| 或缺是什么意思| 什么病属于重大疾病| hpv病毒通过什么途径传播| 埃及人是什么人种| kenwood是什么牌子| 高反人群一般是什么人| 头发是什么组织| ms什么意思| 纾是什么意思| 什么补钾最快| 肾水不足是什么意思| 月经十多天不干净是什么原因| 久而久之下一句是什么| 阴道疼痛什么原因| 望梅止渴是什么意思| 属狗女和什么属相最配| 做穿刺是什么意思| 身上肉疼是什么原因| 中国的母亲河是什么河| 屎是黑色的是什么原因| 梦见双头蛇是什么征兆| 昆仑山在什么地方| 什么时候开始降温| 晚上做梦掉牙有什么预兆| 豆浆机什么牌子好| 女人右手断掌代表什么| 菜花是什么| 黄精是什么药材| 女人吃藕有什么好处| 为什么呢| 小腿经常抽筋是什么原因| 什么是二型糖尿病| 地皮菜是什么菜| 21属什么| 44岁月经量少是什么原因| 什么是色拉油| 百合和拉拉有什么区别| 平动是什么意思| 吃什么减脂肪| ipad什么时候出新款| 什么品牌油烟机好| 迅雷不及掩耳之势是什么意思| 龙龟适合什么属相人| 612是什么星座| 什么能让虱子卵脱落| 一个九一个鸟念什么| 门客是什么意思| 微循环是什么意思| 手指上的斗和簸箕代表什么意思| 糖尿病不能吃什么水果| 软饭是什么意思| 一箭双雕是什么意思| 时过境迁什么意思| 211985是什么意思| 肺纹理增强是什么意思| 青蛙爱吃什么| 嗓子疼看什么科室| 阴虚火旺有什么症状| 西施是什么生肖| 白藜芦醇是什么东西| 2月6日什么星座| 酒精过敏有什么症状| 子宫偏小有什么影响| 血栓是什么| pigeon是什么牌子自行车| 胶囊壳是什么原料做的| 室上速是什么原因导致的| 急性肠胃炎可以吃什么水果| 孕期小腿抽筋什么原因| 缄默什么意思| 乌鸡煲汤放什么材料| 边缘视力是什么意思| 抿嘴是什么意思| 久视伤血是什么意思| 无限未来为什么不写了| 膀胱炎吃什么药好得快| 唇炎用什么药膏| 鼻子流血什么原因| 又什么又什么的花| 女生肚脐眼下面疼是什么原因| 直立倾斜试验阳性是什么病| 百度Jump to content

烟台获批省服务外包示范城市 位列山东省第三

From Wikipedia, the free encyclopedia
(Redirected from Machine language)
百度 体现一定的分类要求,有利于干部在学习教育方面层层递进,避免一锅煮,缺乏针对性。

Machine language monitor running on a W65C816S microprocessor, displaying code disassembly and dumps of processor register and memory

In computer programming, machine code is computer code consisting of machine language instructions, which are used to control a computer's central processing unit (CPU). For conventional binary computers, machine code is the binary[nb 1] representation of a computer program that is actually read and interpreted by the computer. A program in machine code consists of a sequence of machine instructions (possibly interspersed with data).[1]

Each machine code instruction causes the CPU to perform a specific task. Examples of such tasks include:

  1. Load a word from memory to a CPU register
  2. Execute an arithmetic logic unit (ALU) operation on one or more registers or memory locations
  3. Jump or skip to an instruction that is not the next one

In general, each architecture family (e.g., x86, ARM) has its own instruction set architecture (ISA), and hence its own specific machine code language. There are exceptions, such as the VAX architecture, which includes optional support of the PDP-11 instruction set; the IA-64 architecture, which includes optional support of the IA-32 instruction set; and the PowerPC 615 microprocessor, which can natively process both PowerPC and x86 instruction sets.

Machine code is a strictly numerical language, and it is the lowest-level interface to the CPU intended for a programmer. Assembly language provides a direct map between the numerical machine code and a human-readable mnemonic. In assembly, numerical machine code opcodes and operands are replaced with mnemonics and labels. For example, the x86 architecture has available the 0x90 opcode; it is represented as NOP in the assembly source code. While it is possible to write programs directly in machine code, managing individual bits and calculating numerical addresses is tedious and error-prone. Therefore, programs are rarely written directly in machine code. However, an existing machine code program may be edited if the assembly source code is not available.

The majority of programs today are written in a high-level language. A high-level program may be translated into machine code by a compiler.

Instruction set

[edit]

Every processor or processor family has its own instruction set. Machine instructions are patterns of bits[nb 2] that specify some particular action.[2] An instruction set is described by its instruction format. Some ways in which instruction formats may differ:[2]

  • all instructions may have the same length or instructions may have different lengths;
  • the number of instructions may be small or large;
  • instructions may or may not align with the architecture's word length.

A processor's instruction set needs to execute the circuits of a computer's digital logic level. At the digital level, the program needs to control the computer's registers, bus, memory, ALU, and other hardware components.[3] To control a computer's architectural features, machine instructions are created. Examples of features that are controlled using machine instructions:

The criteria for instruction formats include:

  • Instructions most commonly used should be shorter than instructions rarely used.[2]
  • The memory transfer rate of the underlying hardware determines the flexibility of the memory fetch instructions.
  • The number of bits in the address field requires special consideration.[7]

Determining the size of the address field is a choice between space and speed.[7] On some computers, the number of bits in the address field may be too small to access all of the physical memory. Also, virtual address space needs to be considered. Another constraint may be a limitation on the size of registers used to construct the address. Whereas a shorter address field allows the instructions to execute more quickly, other physical properties need to be considered when designing the instruction format.

Instructions can be separated into two types: general-purpose and special-purpose. Special-purpose instructions exploit architectural features that are unique to a computer. General-purpose instructions control architectural features common to all computers.[8]

General-purpose instructions control:

  • Data movement from one place to another
  • Monadic operations that have one operand to produce a result
  • Dyadic operations that have two operands to produce a result
  • Comparisons and conditional jumps
  • Procedure calls
  • Loop control
  • Input/output

Assembly languages

[edit]
Translation of assembly language into machine language

A much more human-friendly rendition of machine language, named assembly language, uses mnemonic codes to refer to machine code instructions, rather than using the instructions' numeric values directly, and uses symbolic names to refer to storage locations and sometimes registers.[9] For example, on the Zilog Z80 processor, the machine code 00000101, which causes the CPU to decrement the B general-purpose register, would be represented in assembly language as DEC B.[10]

Examples

[edit]

IBM 709x

[edit]

The IBM 704, 709, 704x and 709x store one instruction in each instruction word; IBM numbers the bit from the left as S, 1, ..., 35. Most instructions have one of two formats:

Generic
S,1-11
12-13 Flag, ignored in some instructions
14-17 unused
18-20 Tag
21-35 Y
Index register control, other than TSX
S,1-2 Opcode
3-17 Decrement
18-20 Tag
21-35 Y

For all but the IBM 7094 and 7094 II, there are three index registers designated A, B and C; indexing with multiple 1 bits in the tag subtracts the logical or of the selected index registers and loading with multiple 1 bits in the tag loads all of the selected index registers. The 7094 and 7094 II have seven index registers, but when they are powered on they are in multiple tag mode, in which they use only the three of the index registers in a fashion compatible with earlier machines, and require a Leave Multiple Tag Mode (LMTM) instruction in order to access the other four index registers.

The effective address is normally Y-C(T), where C(T) is either 0 for a tag of 0, the logical or of the selected index registers in multiple tag mode or the selected index register if not in multiple tag mode. However, the effective address for index register control instructions is just Y.

A flag with both bits 1 selects indirect addressing; the indirect address word has both a tag and a Y field.

In addition to transfer (branch) instructions, these machines have skip instruction that conditionally skip one or two words, e.g., Compare Accumulator with Storage (CAS) does a three way compare and conditionally skips to NSI, NSI+1 or NSI+2, depending on the result.

MIPS

[edit]

The MIPS architecture provides a specific example for a machine code whose instructions are always 32 bits long.[11]:?299? The general type of instruction is given by the op (operation) field, the highest 6 bits. J-type (jump) and I-type (immediate) instructions are fully specified by op. R-type (register) instructions include an additional field funct to determine the exact operation. The fields used in these types are:

   6      5     5     5     5      6 bits
[  op  |  rs |  rt |  rd |shamt| funct]  R-type
[  op  |  rs |  rt | address/immediate]  I-type
[  op  |        target address        ]  J-type

rs, rt, and rd indicate register operands; shamt gives a shift amount; and the address or immediate fields contain an operand directly.[11]:?299–301?

For example, adding the registers 1 and 2 and placing the result in register 6 is encoded:[11]:?554?

[  op  |  rs |  rt |  rd |shamt| funct]
    0     1     2     6     0     32     decimal
 000000 00001 00010 00110 00000 100000   binary

Load a value into register 8, taken from the memory cell 68 cells after the location listed in register 3:[11]:?552?

[  op  |  rs |  rt | address/immediate]
   35     3     8           68           decimal
 100011 00011 01000 00000 00001 000100   binary

Jumping to the address 1024:[11]:?552?

[  op  |        target address        ]
    2                 1024               decimal
 000010 00000 00000 00000 10000 000000   binary

Overlapping instructions

[edit]

On processor architectures with variable-length instruction sets[12] (such as Intel's x86 processor family) it is, within the limits of the control-flow resynchronizing phenomenon known as the Kruskal count,[13][12][14][15][16] sometimes possible through opcode-level programming to deliberately arrange the resulting code so that two code paths share a common fragment of opcode sequences.[nb 3] These are called overlapping instructions, overlapping opcodes, overlapping code, overlapped code, instruction scission, or jump into the middle of an instruction.[17][18][19]

In the 1970s and 1980s, overlapping instructions were sometimes used to preserve memory space. One example were in the implementation of error tables in Microsoft's Altair BASIC, where interleaved instructions mutually shared their instruction bytes.[20][12][17] The technique is rarely used today, but might still be necessary to resort to in areas where extreme optimization for size is necessary on byte-level such as in the implementation of boot loaders which have to fit into boot sectors.[nb 4]

It is also sometimes used as a code obfuscation technique as a measure against disassembly and tampering.[12][15]

The principle is also used in shared code sequences of fat binaries which must run on multiple instruction-set-incompatible processor platforms.[nb 3]

This property is also used to find unintended instructions called gadgets in existing code repositories and is used in return-oriented programming as alternative to code injection for exploits such as return-to-libc attacks.[21][12]

Relationship to microcode

[edit]

In some computers, the machine code of the architecture is implemented by an even more fundamental underlying layer called microcode, providing a common machine language interface across a line or family of different models of computer with widely different underlying dataflows. This is done to facilitate porting of machine language programs between different models.[22] An example of this use is the IBM System/360 family of computers and their successors.[23]

Relationship to bytecode

[edit]

Machine code is generally different from bytecode (also known as p-code), which is either executed by an interpreter or itself compiled into machine code for faster (direct) execution. An exception is when a processor is designed to use a particular bytecode directly as its machine code, such as is the case with Java processors.

Machine code and assembly code are sometimes called native code when referring to platform-dependent parts of language features or libraries.[24]

Storing in memory

[edit]

From the point of view of the CPU, machine code is stored in RAM, but is typically also kept in a set of caches for performance reasons. There may be different caches for instructions and data, depending on the architecture.[25]

In some systems, from the point of view of a process, the machine code lives in code space, a designated part of its address space. In a multi-threading environment, different threads of one process share code space along with data space, which reduces the overhead of context switching considerably as compared to process switching.[26]

The CPU knows what machine code to execute, based on its internal program counter.[27] The program counter points to a memory address and is changed based on special instructions which may cause programmatic branches.[28] The program counter is typically set to a hard coded value when the CPU is first powered on, and will hence execute whatever machine code happens to be at this address.[29]

Similarly, the program counter can be set to execute whatever machine code is at some arbitrary address, even if this is not valid machine code.[28] This will typically trigger an architecture specific protection fault.[30]

In a paging based system, the CPU is oftentimes told if the current page actually holds machine code by an execute bit — pages have multiple such permission bits (readable, writable, etc.) for various housekeeping functionality.[30] E.g. on Unix-like systems memory pages can be toggled to be executable with the mprotect() system call,[31] and on Windows, VirtualProtect() can be used to achieve a similar result.[32] If an attempt is made to execute machine code on a non-executable page, an architecture specific fault will typically occur.[30]

Similarly, in a segment based system, segment descriptors can indicate whether a segment can contain executable code and in what rings that code can run.[33]

In systems that lack this kind of protection, treating data as machine code, or finding new ways to use existing machine code, by various techniques, is the basis of some software exploits. For example, in Super Mario Bros. 3, manipulating the game's memory to resemble a jump instruction then forcing the game to execute that memory as code allows the player to win the game instantly.[34]

Readability by humans

[edit]

Machine code can be seen as a set of electrical pulses that make the instructions readable to the computer; it is not readable by humans,[35] with Douglas Hofstadter comparing it to examining the atoms of a DNA molecule.[36] However, various tools and methods exist to decode machine code to human-readable source code. One such method is disassembly, which easily decodes it back to its corresponding assembly language source code because assembly language forms a one-to-one mapping to machine code.[37]

Machine code may also be decoded to high-level language under two conditions. The first condition is to accept an obfuscated reading of the source code. An obfuscated version of source code is displayed if the machine code is sent to a decompiler of the source language. The second condition requires the machine code to have information about the source code encoded within. The information includes a symbol table that contains debug symbols. The symbol table may be stored within the executable, or it may exist in separate files. A debugger can then read the symbol table to help the programmer interactively debug the machine code in execution.

See also

[edit]

Notes

[edit]
  1. ^ On nonbinary machines it is, e.g., a decimal representation.
  2. ^ On early decimal machines, patterns of characters, digits and digit sign
  3. ^ a b While overlapping instructions on processor architectures with variable-length instruction sets can sometimes be arranged to merge different code paths back into one through control-flow resynchronization, overlapping code for different processor architectures can sometimes also be crafted to cause execution paths to branch into different directions depending on the underlying processor, as is sometimes used in fat binaries.
  4. ^ For example, the DR-DOS master boot records (MBRs) and boot sectors (which also hold the partition table and BIOS Parameter Block, leaving less than 446 respectively 423 bytes for the code) were traditionally able to locate the boot file in the FAT12 or FAT16 file system by themselves and load it into memory as a whole, in contrast to their counterparts in MS-DOS and PC DOS, which instead rely on the system files to occupy the first two directory entry locations in the file system and the first three sectors of IBMBIO.COM to be stored at the start of the data area in contiguous sectors containing a secondary loader to load the remainder of the file into memory (requiring SYS to take care of all these conditions). When FAT32 and logical block addressing (LBA) support was added, Microsoft even switched to require i386 instructions and split the boot code over two sectors for code size reasons, which was no option to follow for DR-DOS as it would have broken backward- and cross-compatibility with other operating systems in multi-boot and chain load scenarios, and as with older IBM PC–compatible PCs. Instead, the DR-DOS 7.07 boot sectors resorted to self-modifying code, opcode-level programming in machine language, controlled utilization of (documented) side effects, multi-level data/code overlapping and algorithmic folding techniques to still fit everything into a physical sector of only 512 bytes without giving up any of their extended functions.

References

[edit]
  1. ^ Stallings, William (2015). Computer Organization and Architecture 10th edition. Pearson Prentice Hall. p. 776. ISBN 9789332570405.
  2. ^ a b c Tanenbaum 1990, p. 251
  3. ^ Tanenbaum 1990, p. 162
  4. ^ Tanenbaum 1990, p. 231
  5. ^ Tanenbaum 1990, p. 237
  6. ^ Tanenbaum 1990, p. 236
  7. ^ a b Tanenbaum 1990, p. 253
  8. ^ Tanenbaum 1990, p. 283
  9. ^ Dourish, Paul (2004). Where the Action is: The Foundations of Embodied Interaction. MIT Press. p. 7. ISBN 0-262-54178-5. Retrieved 2025-08-05.
  10. ^ Zaks, Rodnay (1982). Programming the Z80 (Third Revised ed.). Sybex. pp. 67, 120, 609. ISBN 0-89588-094-6. Retrieved 2025-08-05.
  11. ^ a b c d e Harris, David; Harris, Sarah L. (2007). Digital Design and Computer Architecture. Morgan Kaufmann Publishers. ISBN 978-0-12-370497-9. Retrieved 2025-08-05.
  12. ^ a b c d e Jacob, Matthias; Jakubowski, Mariusz H.; Venkatesan, Ramarathnam [at Wikidata] (20–21 September 2007). Towards Integral Binary Execution: Implementing Oblivious Hashing Using Overlapped Instruction Encodings (PDF). Proceedings of the 9th workshop on Multimedia & Security (MM&Sec '07). Dallas, Texas, US: Association for Computing Machinery. pp. 129–140. CiteSeerX 10.1.1.69.5258. doi:10.1145/1288869.1288887. ISBN 978-1-59593-857-2. S2CID 14174680. Archived (PDF) from the original on 2025-08-05. Retrieved 2025-08-05. (12 pages)
  13. ^ Lagarias, Jeffrey "Jeff" Clark; Rains, Eric Michael; Vanderbei, Robert J. (2009) [2025-08-05]. "The Kruskal Count". In Brams, Stephen; Gehrlein, William V.; Roberts, Fred S. (eds.). The Mathematics of Preference, Choice and Order. Studies in Choice and Welfare. Berlin / Heidelberg, Germany: Springer-Verlag. pp. 371–391. arXiv:math/0110143. doi:10.1007/978-3-540-79128-7_23. ISBN 978-3-540-79127-0. (22 pages)
  14. ^ Andriesse, Dennis; Bos, Herbert [at Wikidata] (2025-08-05). Written at Vrije Universiteit Amsterdam, Amsterdam, Netherlands. Dietrich, Sven (ed.). Instruction-Level Steganography for Covert Trigger-Based Malware (PDF). 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Lecture Notes in Computer Science. Egham, UK; Switzerland: Springer International Publishing. pp. 41–50 [45]. doi:10.1007/978-3-319-08509-8_3. eISSN 1611-3349. ISBN 978-3-31908508-1. ISSN 0302-9743. S2CID 4634611. LNCS 8550. Archived (PDF) from the original on 2025-08-05. Retrieved 2025-08-05. (10 pages)
  15. ^ a b Jakubowski, Mariusz H. (February 2016). "Graph Based Model for Software Tamper Protection". Microsoft. Archived from the original on 2025-08-05. Retrieved 2025-08-05.
  16. ^ J?mthagen, Christopher (November 2016). On Offensive and Defensive Methods in Software Security (PDF) (Thesis). Lund, Sweden: Department of Electrical and Information Technology, Lund University. p. 96. ISBN 978-91-7623-942-1. ISSN 1654-790X. Archived (PDF) from the original on 2025-08-05. Retrieved 2025-08-05. (1+xvii+1+152 pages)
  17. ^ a b "Unintended Instructions on x86". Hacker News. 2021. Archived from the original on 2025-08-05. Retrieved 2025-08-05.
  18. ^ Kinder, Johannes (2025-08-05). Static Analysis of x86 Executables [Statische Analyse von Programmen in x86 Maschinensprache] (PDF) (Dissertation). Munich, Germany: Technische Universit?t Darmstadt. D17. Archived from the original on 2025-08-05. Retrieved 2025-08-05. (199 pages)
  19. ^ "What is "overlapping instructions" obfuscation?". Reverse Engineering Stack Exchange. 2025-08-05. Archived from the original on 2025-08-05. Retrieved 2025-08-05.
  20. ^ Gates, William "Bill" Henry, Personal communication (NB. According to Jacob et al.)
  21. ^ Shacham, Hovav (2007). The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) (PDF). Proceedings of the ACM, CCS 2007. ACM Press. Archived (PDF) from the original on 2025-08-05. Retrieved 2025-08-05.
  22. ^ Kent, Allen; Williams, James G. (2025-08-05). Encyclopedia of Computer Science and Technology: Volume 28 - Supplement 13: AerosPate Applications of Artificial Intelligence to Tree Structures. CRC Press. pp. 33–34. ISBN 978-0-8247-2281-4.
  23. ^ Tucker, S. G. (2025-08-05). "Microprogram control for SYSTEM/360". IBM Systems Journal. 6 (4): 222–241. doi:10.1147/sj.64.0222. ISSN 0018-8670 – via IEEE Xplore.
  24. ^ Gregory, Kate (2025-08-05). "Managed, Unmanaged, Native: What Kind of Code Is This?". Developer.com. Archived from the original on 2025-08-05. Retrieved 2025-08-05.
  25. ^ Su, Chao; Zeng, Qingkai (2021). "Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures". Security and Communication Networks. 2021 (1): 5559552. doi:10.1155/2021/5559552. ISSN 1939-0122.
  26. ^ "CS 537 Notes, Section #3A: Processes and Threads". pages.cs.wisc.edu. School of Computer, Data & Information Sciences, University of Wisconsin-Madison. Retrieved 2025-08-05.
  27. ^ Hayes, John Patrick (1978). Computer Architecture and Organization. McGraw-Hill. p. 245. ISBN 978-0-07-027363-4.
  28. ^ a b Principles of Operation, Type 701 and Associated Equipment (PDF). IBM. 1953. pp. 23–24.
  29. ^ Bates, Martin (2025-08-05). PIC Microcontrollers: An Introduction to Microelectronics. Elsevier. p. 30. ISBN 978-0-08-096911-4.
  30. ^ a b c Intel? 64 and IA-32 Architectures Software Developer's Manual, Volume 3A: System Programming Guide, Part 1 (PDF). Intel. September 2016. pp. 4-31 – 4-32, 5-2 – 5-3.
  31. ^ "mprotect(2) - Linux manual page". www.man7.org. Retrieved 2025-08-05.
  32. ^ karl-bridge-microsoft. "VirtualProtect function (memoryapi.h) - Win32 apps". learn.microsoft.com. Retrieved 2025-08-05.
  33. ^ Daniel Tabak (1995). Advanced microprocessors. Internet Archive. McGraw-Hill. p. 149. ISBN 978-0-07-062843-4.
  34. ^ Retro Game Mechanics Explained (2025-08-05). Super Mario Bros. 3 - Wrong Warp. Retrieved 2025-08-05 – via YouTube.
  35. ^ Samuelson 1984, p. 683.
  36. ^ Hofstadter 1979, p. 290.
  37. ^ Tanenbaum 1990, p. 398.
  38. ^ "Associated Data Architecture". High Level Assembler and Toolkit Feature.
  39. ^ "Associated data file output" (PDF). High Level Assembler for z/OS & z/VM & z/VSE - 1.6 -HLASM Programmer's Guide (PDF) (Eighth ed.). IBM. October 2022. pp. 278–332. SC26-4941-07. Retrieved 2025-08-05.
  40. ^ "COBOL SYSADATA file contents". Enterprise COBOL for z/OS.
  41. ^ "SYSADATA message information". Enterprise PL/I for z/OS 6.1 information. 2025-08-05.
  42. ^ "Appendix C. Generalized object file format (GOFF)" (PDF). z/OS - 3.1 - MVS Program Management: Advanced Facilities (PDF). IBM. 2025-08-05. pp. 201–240. SA23-1392-60. Retrieved 2025-08-05.
  43. ^ "Symbols for Windows debugging". Microsoft Learn. 2025-08-05.
  44. ^ "Querying the .Pdb File". Microsoft Learn. 2025-08-05.

Sources

[edit]

Further reading

[edit]
10月23号是什么星座 口渴是什么病的症状 牛肉不能和什么一起吃 艾滋病阳性是什么意思 肝功高是什么原因引起的
做尿常规挂什么科 肚子一直咕咕叫是什么原因 山谷念什么 贵州有什么好吃的 女人来月经有血块是什么原因
减脂是什么意思 冷暖自知上一句是什么 石斛什么功效 洗涤剂是什么 吃什么东西
胃疼屁多是什么原因 海带绿豆汤有什么功效 梦见数钱是什么预兆 嗜血是什么意思 查过敏原挂什么科
掌纹多而乱代表什么chuanglingweilai.com 肺实性结节是什么意思bfb118.com 外阴白斑用什么药最好hcv9jop3ns7r.cn rap是什么意思96micro.com 梦到吃蛇肉预示着什么hcv7jop7ns2r.cn
骨折吃什么补品hcv8jop8ns2r.cn 克罗心是什么牌子hcv8jop4ns6r.cn 哥哥的儿子叫什么travellingsim.com 助听器什么牌子好用hcv8jop6ns5r.cn 心脏右束支传导阻滞是什么意思hcv8jop4ns9r.cn
暗经是什么意思naasee.com 肚子疼吃什么hebeidezhi.com 血卡是什么hcv8jop9ns3r.cn 一什么蛇hcv9jop5ns6r.cn 想怀孕需要检查什么项目96micro.com
湿毒吃什么药最有效xinmaowt.com 乌龟吃什么hcv9jop2ns2r.cn 海藻酸钠是什么hcv9jop5ns8r.cn 掉马是什么意思hcv8jop0ns4r.cn 颈椎反弓是什么意思imcecn.com
百度