Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Eax Int'
Eax Int published presentations and documents on DocSlides.
Existinglibraryngerprintingtechniquesusesimplepat-ternmatchingtoident
by lois-ondreau
pushebp movesp,ebp pushebx sub...,esp mov...,eax t...
Superoptimization
by giovanna-bartolotta
Venkatesh. . Karthik. Srinivasan. Guest Lecture...
Superoptimization
by phoebe-click
Venkatesh. . Karthik. Srinivasan. Guest Lecture...
Randal E. Bryant
by tatiana-dople
Carnegie Mellon University. CS:APP2e. CS:APP Chap...
The (5) Parts Every Computer MUST have
by tawny-fly
Humans. Computers. Input Devices (getting informa...
AutomaticStaticUnpackingofMalwareBinariesKevinCooganSaumyaDebrayTasnee
by lindy-dunigan
Instr Address x86assemblycode 0x401000: f...encryp...
Estimating Types in Binaries
by lois-ondreau
using Predictive Modeling. Omer Katz. , Ran El-. ...
Seoul National University
by liane-varnes
Pipelined Implementation : . Part . I. Overview. ...
Performance Optimizations
by luanne-stotts
in . Dyninst. Andrew . Bernat. , Matthew Legendre...
CS 201 - Introduction to Computing
by danika-pritchard
Albert Levi. FENS 1091. levi@sabanciuniv.edu. Cou...
AutomaticStaticUnpackingofMalwareBinariesKevinCooganSaumyaDebrayTasnee
by marina-yarberry
Instr Address x86assemblycode 0x401000: f...encryp...
DrDebug
by alexa-scheidler
: . D. eterministic . R. eplay based Cyclic . Deb...
Input, Output, and Automation in x86 Proved
by min-jolicoeur
Jason Gross. Hosted by Andrew Kennedy. Summer 201...
Reverse Engineering
by kittie-lecroy
Mitchell Adair. January, 2014. About Me. Know Owe...
Introduction to X86
by conchita-marotz
assembly. b. y . Istvan. Haller. Assembly syntax...
Hello ASM World:
by pasty-toler
A Painless and Contextual Introduction to x86 Ass...
Seoul National University
by ellena-manuel
Pipelined Implementation : . Part . I. Overview. ...
Assembly Language for x86 Processors
by liane-varnes
6th Edition . Chapter 4. : Data-Related Operator...
Identifying and Analyzing Pointer Misuses for Sophisticated
by yoshiko-marsland
Memory-corruption Exploit Diagnosis. Mingwei. Zh...
Parallelism and Concurrency
by danika-pritchard
Motivation, Challenges, Impact on Software Develo...
Compilers: From Programming to Execution
by natalia-silvester
David Brumley. Carnegie Mellon University. You wi...
Parallelism and Concurrency
by faustina-dinatale
Motivation, Challenges, Impact on Software Develo...
David Brumley Carnegie Mellon University
by trish-goza
Credit: Some slides from Ed Schwartz. Control Flo...
Model-Assisted Machine-Code Synthesis
by ellena-manuel
Venkatesh. . Srinivasan*, . Ara . Vartanian. , ....
Irvine, Kip R. Assembly Language for x86 Processors 7/e, 2015.
by briana-ranney
1. Multiplication and Division Instructions. MUL ...
Processes Process Concept
by pasty-toler
A primary task of an operating system is to execu...
Chapter 4 A Crash Course on x86 Disassembly
by tawny-fly
Levels of Abstraction. Computer systems: several ...
CS 5600 Computer Systems
by celsa-spraggs
CS 5600 Computer Systems Lecture 3: Hardware, CPU...
The Hardware/Software Interface
by botgreat
CSE 351 Winter 2015. Instructor:. . Luis Ceze. Te...
David Brumley Carnegie Mellon University
by beatever
Credit: Some slides from Ed Schwartz. Control Flow...
TEMU: Binary Code Analysis via Whole-SystemLayered Annotative Executio
by caroline
Heng YinDawn Song Electrical Engineering and Compu...
Introduction to Assembly
by ani
Here we have a brief introduction to . Intel Assem...
Alibi: Attested Instruction Tracing as a Secure Thin Interm
by debby-jeon
Vyas Sekar, Petros Maniatis. ISTC for Secure ...
Part 6: Special Topics
by conchita-marotz
Chapter 19: . Shellcode. Analysis. Chapter 20: C...
The Superdiversifier:
by marina-yarberry
Peephole Individualization for Software Protectio...
Introduction to Reverse Engineering
by tatyana-admore
Inbar Raz. Malware Research Lab Manager. December...
Safe to the Last Instruction:
by test
Automated Verification of a Type-Safe Operating S...
Cache
by yoshiko-marsland
Memory and Performance. Many . of the following ...
15-213
by karlyn-bohler
Recitation. 2. Feb 2015. Jimmy Jin. Agenda. Bomb...
High-Performing
by tawny-fly
JavaScript . for . Modern Engines. Amanda Silver...
Load More...