Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Eax Code'
Eax Code published presentations and documents on DocSlides.
Existinglibraryngerprintingtechniquesusesimplepat-ternmatchingtoident
by lois-ondreau
pushebp movesp,ebp pushebx sub...,esp mov...,eax t...
Superoptimization
by giovanna-bartolotta
Venkatesh. . Karthik. Srinivasan. Guest Lecture...
Superoptimization
by phoebe-click
Venkatesh. . Karthik. Srinivasan. Guest Lecture...
Randal E. Bryant
by tatiana-dople
Carnegie Mellon University. CS:APP2e. CS:APP Chap...
Today
by test
Program optimization. Optimization blocker: Memor...
AutomaticStaticUnpackingofMalwareBinariesKevinCooganSaumyaDebrayTasnee
by lindy-dunigan
Instr Address x86assemblycode 0x401000: f...encryp...
Estimating Types in Binaries
by lois-ondreau
using Predictive Modeling. Omer Katz. , Ran El-. ...
Seoul National University
by liane-varnes
Pipelined Implementation : . Part . I. Overview. ...
CS 201 - Introduction to Computing
by danika-pritchard
Albert Levi. FENS 1091. levi@sabanciuniv.edu. Cou...
AutomaticStaticUnpackingofMalwareBinariesKevinCooganSaumyaDebrayTasnee
by marina-yarberry
Instr Address x86assemblycode 0x401000: f...encryp...
DrDebug
by alexa-scheidler
: . D. eterministic . R. eplay based Cyclic . Deb...
Input, Output, and Automation in x86 Proved
by min-jolicoeur
Jason Gross. Hosted by Andrew Kennedy. Summer 201...
Reverse Engineering
by kittie-lecroy
Mitchell Adair. January, 2014. About Me. Know Owe...
1 Machine-Level Programming IV:
by tatiana-dople
x86-64 Procedures, Data. Today. Procedures (x86-6...
Hello ASM World:
by pasty-toler
A Painless and Contextual Introduction to x86 Ass...
Seoul National University
by ellena-manuel
Pipelined Implementation : . Part . I. Overview. ...
Assembly Language for x86 Processors
by liane-varnes
6th Edition . Chapter 4. : Data-Related Operator...
X32 – A
by lois-ondreau
Native. . 32bit ABI For . X86-64. H.J. Lu, H Pet...
Identifying and Analyzing Pointer Misuses for Sophisticated
by yoshiko-marsland
Memory-corruption Exploit Diagnosis. Mingwei. Zh...
X32 – A Native 32bit ABI For
by alexa-scheidler
X86-64. H.J. Lu, H Peter Anvin, Milind Girkar. Se...
Compilers: From Programming to Execution
by natalia-silvester
David Brumley. Carnegie Mellon University. You wi...
Reverse Engineering Mitchell Adair
by lindy-dunigan
1/22/2013. About Me. Know Owen from our time at S...
Irvine, Kip R. Assembly Language for x86 Processors 7/e, 2015.
by briana-ranney
1. Multiplication and Division Instructions. MUL ...
Processes Process Concept
by pasty-toler
A primary task of an operating system is to execu...
Ramblr Making Reassembly Great Again
by jalin
Ruoyu. “Fish” Wang, Yan Shoshitaishvili, Anto...
Credits and Disclaimers The examples and discussion in the following slides have been adapted from
by singh
Chapter 3 of Computer Systems 3. nd. Edition by B...
Monday, February 12, 2023
by iris
Computer Systems. Winter 2023. Stanford University...
Low level Programming
by marina-yarberry
Linux ABI. System Calls. Everything distills into...
Program Optimization (Chapter 5)
by liane-varnes
Overview. Generally Useful Optimizations. Code mo...
Safe to the Last Instruction:
by test
Automated Verification of a Type-Safe Operating S...
Cache
by yoshiko-marsland
Memory and Performance. Many . of the following ...
15-213
by karlyn-bohler
Recitation. 2. Feb 2015. Jimmy Jin. Agenda. Bomb...
Compiler
by jane-oiler
Construction. Overview . & Lessons . Learned ...
Hacking QuickTime:
by yoshiko-marsland
Exception or Exploit?. Jared . DeMott. Quote to R...
Carnegie Mellon
by sherrill-nordquist
Assembly and Bomb Lab. 15-213: Introduction to Co...
Midterm Review
by olivia-moreira
15-213: Introduction to Computer Systems. Recitat...
1 Carnegie Mellon
by tatyana-admore
Stacks. 15-213: Introduction to Computer Systems....
Flipping Bits in Memory Without Accessing Them:
by lindy-dunigan
DRAM Disturbance Errors. Yoongu Kim. Ross Daly, J...
Statistical Similarity
by luanne-stotts
of Binaries. Yaniv David. , Nimrod . Partush. , ....
Advanced x86: Virtualization with VT-x
by alida-meadow
Part 1. David Weinstein . dweinst@insitusec.com. ...
Load More...