Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Eax-Code'
Eax-Code published presentations and documents on DocSlides.
Superoptimization
by phoebe-click
Venkatesh. . Karthik. Srinivasan. Guest Lecture...
Superoptimization
by giovanna-bartolotta
Venkatesh. . Karthik. Srinivasan. Guest Lecture...
Existinglibraryngerprintingtechniquesusesimplepat-ternmatchingtoident
by lois-ondreau
pushebp movesp,ebp pushebx sub...,esp mov...,eax t...
Monday, February 12, 2023
by iris
Computer Systems. Winter 2023. Stanford University...
Credits and Disclaimers The examples and discussion in the following slides have been adapted from
by singh
Chapter 3 of Computer Systems 3. nd. Edition by B...
Ramblr Making Reassembly Great Again
by jalin
Ruoyu. “Fish” Wang, Yan Shoshitaishvili, Anto...
Processes Process Concept
by pasty-toler
A primary task of an operating system is to execu...
Irvine, Kip R. Assembly Language for x86 Processors 7/e, 2015.
by briana-ranney
1. Multiplication and Division Instructions. MUL ...
Reverse Engineering Mitchell Adair
by lindy-dunigan
1/22/2013. About Me. Know Owen from our time at S...
Compilers: From Programming to Execution
by natalia-silvester
David Brumley. Carnegie Mellon University. You wi...
X32 – A Native 32bit ABI For
by alexa-scheidler
X86-64. H.J. Lu, H Peter Anvin, Milind Girkar. Se...
Identifying and Analyzing Pointer Misuses for Sophisticated
by yoshiko-marsland
Memory-corruption Exploit Diagnosis. Mingwei. Zh...
X32 – A
by lois-ondreau
Native. . 32bit ABI For . X86-64. H.J. Lu, H Pet...
Assembly Language for x86 Processors
by liane-varnes
6th Edition . Chapter 4. : Data-Related Operator...
Seoul National University
by ellena-manuel
Pipelined Implementation : . Part . I. Overview. ...
Hello ASM World:
by pasty-toler
A Painless and Contextual Introduction to x86 Ass...
1 Machine-Level Programming IV:
by tatiana-dople
x86-64 Procedures, Data. Today. Procedures (x86-6...
Seoul National University
by liane-varnes
Pipelined Implementation : . Part . I. Overview. ...
AutomaticStaticUnpackingofMalwareBinariesKevinCooganSaumyaDebrayTasnee
by marina-yarberry
Instr Address x86assemblycode 0x401000: f...encryp...
DrDebug
by alexa-scheidler
: . D. eterministic . R. eplay based Cyclic . Deb...
Input, Output, and Automation in x86 Proved
by min-jolicoeur
Jason Gross. Hosted by Andrew Kennedy. Summer 201...
Reverse Engineering
by kittie-lecroy
Mitchell Adair. January, 2014. About Me. Know Owe...
CS 201 - Introduction to Computing
by danika-pritchard
Albert Levi. FENS 1091. levi@sabanciuniv.edu. Cou...
Randal E. Bryant
by tatiana-dople
Carnegie Mellon University. CS:APP2e. CS:APP Chap...
Today
by test
Program optimization. Optimization blocker: Memor...
AutomaticStaticUnpackingofMalwareBinariesKevinCooganSaumyaDebrayTasnee
by lindy-dunigan
Instr Address x86assemblycode 0x401000: f...encryp...
Estimating Types in Binaries
by lois-ondreau
using Predictive Modeling. Omer Katz. , Ran El-. ...
Machine-Level Programming III:
by conterc
Switch Statements . and . IA32 Procedures. Seoul ...
CET 3510 - Microcomputer Systems Technology
by giovanna-bartolotta
Lecture 6. Dr. José M. Reyes Álamo. 1. Review:....
Irvine, Kip R. Assembly Language for x86 Processors 7/e, 2015
by briana-ranney
. (modified). 1. Shift, Multiply, and Divide. Shi...
Exploits Buffer Overflows and Format String Attacks
by jane-oiler
David Brumley. Carnegie Mellon University. You wi...
Advanced x86: Virtualization with VT-x
by alida-meadow
Part 1. David Weinstein . dweinst@insitusec.com. ...
Statistical Similarity
by luanne-stotts
of Binaries. Yaniv David. , Nimrod . Partush. , ....
Flipping Bits in Memory Without Accessing Them:
by lindy-dunigan
DRAM Disturbance Errors. Yoongu Kim. Ross Daly, J...
1 Carnegie Mellon
by tatyana-admore
Stacks. 15-213: Introduction to Computer Systems....
Midterm Review
by olivia-moreira
15-213: Introduction to Computer Systems. Recitat...
Compiler
by jane-oiler
Construction. Overview . & Lessons . Learned ...
15-213
by karlyn-bohler
Recitation. 2. Feb 2015. Jimmy Jin. Agenda. Bomb...
Low level Programming
by marina-yarberry
Linux ABI. System Calls. Everything distills into...
Carnegie Mellon
by sherrill-nordquist
Assembly and Bomb Lab. 15-213: Introduction to Co...
Load More...