血去掉一撇念什么| 贵州菜属于什么菜系| 低盐饮食有利于预防什么疾病| np文是什么意思| 宝宝大便绿色是什么原因| 冬天送什么礼物| 什么叫无氧运动| 牙疼吃什么食物能缓解| 坐骨神经痛吃什么药好得快| 胸闷气短吃什么药| 氯气是什么颜色| 静脉曲张吃什么食物好| 收留是什么意思| ba是什么元素| 什么球不能踢脑筋急转弯| 现在什么星座| 手皮脱皮是什么原因| 纯水是什么水| 术后吃什么伤口愈合快| 国民老公是什么意思| 胰岛素ins是什么意思| 经期吃什么排污血最强| 健康证明需要检查什么| 漠河什么时候可以看到极光| 吃什么白蛋白提升快| 14年属什么生肖| cvc是什么| 力不到不为财是什么意思| 为什么喝酒后会头疼| 蒲公英和什么一起泡水喝最好| 控制血糖吃什么食物| 手表五行属什么| 自然生化流产是什么意思| 聊表心意是什么意思| 笔仙是什么| ad吃到什么时候| 真菌性龟头炎用什么药| 2006年属狗的是什么命| 腰椎间盘突出什么症状| 唐筛是什么意思| 北京是我国的什么中心| 乳腺钙化是什么意思| 脱节是什么意思| 感冒吃什么药最快| 秦始皇墓为什么不敢挖| 1973年属牛的是什么命| 权志龙为什么这么火| 鹅翅膀下垂是什么原因| 女生私处长什么样| 搬新家有什么讲究和准备的| 耳鸣挂什么科| 生态棉是什么面料| 布洛芬什么时候起效| 肩周炎有什么症状| 霍山石斛有什么功效| 藕带是什么| 酸梅汤有什么功效| tiamo是什么意思| 姓林的女孩取什么名字好| 黄连泡水喝有什么功效| 什么的旋律| 生理盐水敷脸有什么效果| 老婆饼为什么叫老婆饼| 湖北有什么好玩的| 八仙过海开过什么生肖| 暴躁是什么意思| 骨质增生是什么原因引起的| 转氨酶高吃什么药好| 土加亥念什么| 茯苓有什么功效和作用| 特应性皮炎是什么病| 轰20什么时候首飞| 什么是射精| 头部容易出汗是什么原因| 仓促是什么意思| 什么情况要打破伤风针| cm是什么岗位| 梦见栽花是什么意思| 儿童办理身份证需要什么材料| 为什么会得霉菌感染| 十一月十七日是什么星座| 里脊肉炒什么好吃| 神气活现是什么意思| 吃什么开胃增加食欲| 复方对乙酰氨基酚片是什么药| 弱精吃什么能提高活力| 服中药期间忌吃什么| 结节性硬化症是什么病| 为什么一吃饭就肚子疼| 月经来了吃什么好| 男人得了hpv有什么症状| 番薯是什么意思| 国历是什么意思| 湿疹用什么药膏| 彩金和黄金有什么区别| 果酱样大便见于什么病| 鼻涕是绿色的是什么原因| 嗓子不舒服吃什么消炎药| 什么是正月| 李连杰是什么国籍| 小三阳吃什么药能转阴| omega3是什么意思| 今年属于什么生肖| 例假期间吃什么减肥| 不可磨灭是什么意思| 扁头适合什么发型| 999足金是什么意思| 连翘败毒丸的功效与作用是什么| 糖醇是什么意思| 金蝉什么时候出土| 一花一世界下一句是什么| 什么网名| 没有胎心胎芽是什么原因造成的| 子宫在什么位置| 补料是什么意思| k金是什么金| 屁股尾骨疼是什么原因| 知了猴吃什么长大的| 左脸长痣代表什么| 忘带洗面奶用什么代替| 拔智齿后吃什么| 百米12秒什么水平| 乙酉日五行属什么| 来月经有什么症状| 白兰地是什么酒| 草莓是什么季节| 燃烧卡路里是什么意思| 切除痣挂什么科| 做梦梦到狮子是什么意思| 过敏性紫癜用什么药| 运是什么结构| 逸搏心律什么意思| 种草什么意思| 肩膀疼吃什么药| 立flag是什么意思| 做梦拉屎是什么意思| 什么情况下要打狂犬疫苗| 那好吧是什么意思| iu是什么单位| 汉武帝叫什么名字| 红蜘蛛用什么药最有效| 什么水果含糖量最低| 眼睛总有眼屎是什么原因| crab是什么意思| 保底工资是什么意思| 雷替斯是什么药| 缓解是什么意思| 胰腺做什么检查| ber什么意思| 气短气喘吃什么药| 手脱皮用什么药好得快| 菱角什么时候成熟| 屈原姓什么| 职称有什么用| 什么颜色的床单有助于睡眠| 玉髓是什么玉| 为什么有两个六月| 神经官能症有什么症状表现| 外阴瘙痒吃什么药| 砖茶是什么茶| 短阵房速是什么意思| 人到无求品自高什么意思| 碧生源减肥茶有什么副作用| 1949属什么生肖| 喝杨梅酒对身体有什么好处| 辣木籽是什么| 煮虾放什么| 一直打嗝不止是什么原因| 龛是什么意思| 血液净化是什么意思| 血糖高能吃什么菜| 什么动物有四个胃| 蓝天白云是什么生肖| 什么样的人长寿| 拜阿司匹林和阿司匹林有什么区别| 阴茎出血是什么原因| 贝壳像什么| 涵养是什么意思| 黄晓明的老婆叫什么名字| 早茶是什么意思| 紫荆花的花语是什么| 421是什么意思| 清道夫鱼有什么作用| 什么不什么干| 葛根是什么东西| 坐月子可以喝什么饮料| 肝病有什么症状| 药食同源是什么意思| 高血压适合做什么运动| 拔指甲挂什么科| ckd3期是什么意思| 牛的三合和六个合生肖是什么| 扁平疣用什么药膏除根| 四季豆不能和什么一起吃| 启攒是什么意思| 食邑万户是什么意思| 脚臭是什么原因| 摩羯座是什么星象| 学中医需要什么学历| 银屑病用什么药最好| 滋阴润燥是什么意思| 鲐背之年是什么意思| 随餐吃是什么意思| 弹力棉是什么面料| 脸色发红什么原因| 老实忠厚是什么生肖| vocabulary是什么意思| 澳门什么时候回归祖国| 办理港澳通行证需要带什么证件| 外传是什么意思| 肌层回声均匀是什么意思| 电子烟有什么危害| 立羽读什么| 九二年属什么| 5点到7点是什么时辰| 什么是融合菜| 礼物送什么| 已故是什么意思| 家严是什么意思| 用什么锅炒菜对人体健康更有益| 哮喘用什么药| 肺占位病变是什么意思| 小肚子疼是什么原因| 标准工资指什么| 京东积分有什么用| 孩子发烧吃什么饭菜好| 促甲状腺激素偏高有什么症状| 什么食物含碘| 组cp是什么意思| 什么是幽门螺杆菌| 大海是什么颜色| 拉肚子出血是什么原因| 糖尿病不能吃什么| 心花怒放是什么生肖| 女性私处为什么会变黑| 决明子是什么东西| 江西有什么景点| 面膜什么牌子好| 祸起萧墙是什么意思| 三七花泡水喝有什么功效| 荨麻疹要用什么药| 不自主的摇头是什么病| 乌鸦飞进家里什么征兆| 为什么老放屁| 蔡英文是什么党| 智能手环是干什么用的| 什么杀精子最厉害| 公主抱是什么意思| 1969年属什么生肖| beko是什么牌子| 什么什么情深| 权志龙的团队叫什么| 沈殿霞为什么地位高| 疱疹性咽峡炎吃什么食物| 外痔长什么样| hbeab阳性是什么意思| 肛门潮湿是什么情况| 为什么肠道总是咕咕的响| 破执是什么意思| 大致是什么意思| 祖籍是什么意思| 黄体功能不足是什么原因造成的| 断交社保有什么影响| 咖啡喝多了有什么危害| 百度

卵巢多囊是什么意思

百度 从某种意义上讲,城市学既是“城市系统学”又是“城市生命学”。

In computer programming, machine code is computer code consisting of machine language instructions, which are used to control a computer's central processing unit (CPU). For conventional binary computers, machine code is the binary[nb 1] representation of a computer program that is actually read and interpreted by the computer. A program in machine code consists of a sequence of machine instructions (possibly interspersed with data).[1]

Machine language monitor running on a W65C816S microprocessor, displaying code disassembly and dumps of processor register and memory

Each machine code instruction causes the CPU to perform a specific task. Examples of such tasks include:

  1. Load a word from memory to a CPU register
  2. Execute an arithmetic logic unit (ALU) operation on one or more registers or memory locations
  3. Jump or skip to an instruction that is not the next one

In general, each architecture family (e.g., x86, ARM) has its own instruction set architecture (ISA), and hence its own specific machine code language. There are exceptions, such as the VAX architecture, which includes optional support of the PDP-11 instruction set; the IA-64 architecture, which includes optional support of the IA-32 instruction set; and the PowerPC 615 microprocessor, which can natively process both PowerPC and x86 instruction sets.

Machine code is a strictly numerical language, and it is the lowest-level interface to the CPU intended for a programmer. Assembly language provides a direct map between the numerical machine code and a human-readable mnemonic. In assembly, numerical machine code opcodes and operands are replaced with mnemonics and labels. For example, the x86 architecture has available the 0x90 opcode; it is represented as NOP in the assembly source code. While it is possible to write programs directly in machine code, managing individual bits and calculating numerical addresses is tedious and error-prone. Therefore, programs are rarely written directly in machine code. However, an existing machine code program may be edited if the assembly source code is not available.

The majority of programs today are written in a high-level language. A high-level program may be translated into machine code by a compiler.

Instruction set

edit

Every processor or processor family has its own instruction set. Machine instructions are patterns of bits[nb 2] that specify some particular action.[2] An instruction set is described by its instruction format. Some ways in which instruction formats may differ:[2]

  • all instructions may have the same length or instructions may have different lengths;
  • the number of instructions may be small or large;
  • instructions may or may not align with the architecture's word length.

A processor's instruction set needs to execute the circuits of a computer's digital logic level. At the digital level, the program needs to control the computer's registers, bus, memory, ALU, and other hardware components.[3] To control a computer's architectural features, machine instructions are created. Examples of features that are controlled using machine instructions:

The criteria for instruction formats include:

  • Instructions most commonly used should be shorter than instructions rarely used.[2]
  • The memory transfer rate of the underlying hardware determines the flexibility of the memory fetch instructions.
  • The number of bits in the address field requires special consideration.[7]

Determining the size of the address field is a choice between space and speed.[7] On some computers, the number of bits in the address field may be too small to access all of the physical memory. Also, virtual address space needs to be considered. Another constraint may be a limitation on the size of registers used to construct the address. Whereas a shorter address field allows the instructions to execute more quickly, other physical properties need to be considered when designing the instruction format.

Instructions can be separated into two types: general-purpose and special-purpose. Special-purpose instructions exploit architectural features that are unique to a computer. General-purpose instructions control architectural features common to all computers.[8]

General-purpose instructions control:

  • Data movement from one place to another
  • Monadic operations that have one operand to produce a result
  • Dyadic operations that have two operands to produce a result
  • Comparisons and conditional jumps
  • Procedure calls
  • Loop control
  • Input/output

Assembly languages

edit
 
Translation of assembly language into machine language

A much more human-friendly rendition of machine language, named assembly language, uses mnemonic codes to refer to machine code instructions, rather than using the instructions' numeric values directly, and uses symbolic names to refer to storage locations and sometimes registers.[9] For example, on the Zilog Z80 processor, the machine code 00000101, which causes the CPU to decrement the B general-purpose register, would be represented in assembly language as DEC B.[10]

Examples

edit

IBM 709x

edit

The IBM 704, 709, 704x and 709x store one instruction in each instruction word; IBM numbers the bit from the left as S, 1, ..., 35. Most instructions have one of two formats:

Generic
S,1-11
12-13 Flag, ignored in some instructions
14-17 unused
18-20 Tag
21-35 Y
Index register control, other than TSX
S,1-2 Opcode
3-17 Decrement
18-20 Tag
21-35 Y

For all but the IBM 7094 and 7094 II, there are three index registers designated A, B and C; indexing with multiple 1 bits in the tag subtracts the logical or of the selected index registers and loading with multiple 1 bits in the tag loads all of the selected index registers. The 7094 and 7094 II have seven index registers, but when they are powered on they are in multiple tag mode, in which they use only the three of the index registers in a fashion compatible with earlier machines, and require a Leave Multiple Tag Mode (LMTM) instruction in order to access the other four index registers.

The effective address is normally Y-C(T), where C(T) is either 0 for a tag of 0, the logical or of the selected index registers in multiple tag mode or the selected index register if not in multiple tag mode. However, the effective address for index register control instructions is just Y.

A flag with both bits 1 selects indirect addressing; the indirect address word has both a tag and a Y field.

In addition to transfer (branch) instructions, these machines have skip instruction that conditionally skip one or two words, e.g., Compare Accumulator with Storage (CAS) does a three way compare and conditionally skips to NSI, NSI+1 or NSI+2, depending on the result.

MIPS

edit

The MIPS architecture provides a specific example for a machine code whose instructions are always 32 bits long.[11]:?299? The general type of instruction is given by the op (operation) field, the highest 6 bits. J-type (jump) and I-type (immediate) instructions are fully specified by op. R-type (register) instructions include an additional field funct to determine the exact operation. The fields used in these types are:

   6      5     5     5     5      6 bits
[  op  |  rs |  rt |  rd |shamt| funct]  R-type
[  op  |  rs |  rt | address/immediate]  I-type
[  op  |        target address        ]  J-type

rs, rt, and rd indicate register operands; shamt gives a shift amount; and the address or immediate fields contain an operand directly.[11]:?299–301?

For example, adding the registers 1 and 2 and placing the result in register 6 is encoded:[11]:?554?

[  op  |  rs |  rt |  rd |shamt| funct]
    0     1     2     6     0     32     decimal
 000000 00001 00010 00110 00000 100000   binary

Load a value into register 8, taken from the memory cell 68 cells after the location listed in register 3:[11]:?552?

[  op  |  rs |  rt | address/immediate]
   35     3     8           68           decimal
 100011 00011 01000 00000 00001 000100   binary

Jumping to the address 1024:[11]:?552?

[  op  |        target address        ]
    2                 1024               decimal
 000010 00000 00000 00000 10000 000000   binary

Overlapping instructions

edit

On processor architectures with variable-length instruction sets[12] (such as Intel's x86 processor family) it is, within the limits of the control-flow resynchronizing phenomenon known as the Kruskal count,[13][12][14][15][16] sometimes possible through opcode-level programming to deliberately arrange the resulting code so that two code paths share a common fragment of opcode sequences.[nb 3] These are called overlapping instructions, overlapping opcodes, overlapping code, overlapped code, instruction scission, or jump into the middle of an instruction.[17][18][19]

In the 1970s and 1980s, overlapping instructions were sometimes used to preserve memory space. One example were in the implementation of error tables in Microsoft's Altair BASIC, where interleaved instructions mutually shared their instruction bytes.[20][12][17] The technique is rarely used today, but might still be necessary to resort to in areas where extreme optimization for size is necessary on byte-level such as in the implementation of boot loaders which have to fit into boot sectors.[nb 4]

It is also sometimes used as a code obfuscation technique as a measure against disassembly and tampering.[12][15]

The principle is also used in shared code sequences of fat binaries which must run on multiple instruction-set-incompatible processor platforms.[nb 3]

This property is also used to find unintended instructions called gadgets in existing code repositories and is used in return-oriented programming as alternative to code injection for exploits such as return-to-libc attacks.[21][12]

Relationship to microcode

edit

In some computers, the machine code of the architecture is implemented by an even more fundamental underlying layer called microcode, providing a common machine language interface across a line or family of different models of computer with widely different underlying dataflows. This is done to facilitate porting of machine language programs between different models.[22] An example of this use is the IBM System/360 family of computers and their successors.[23]

Relationship to bytecode

edit

Machine code is generally different from bytecode (also known as p-code), which is either executed by an interpreter or itself compiled into machine code for faster (direct) execution. An exception is when a processor is designed to use a particular bytecode directly as its machine code, such as is the case with Java processors.

Machine code and assembly code are sometimes called native code when referring to platform-dependent parts of language features or libraries.[24]

Storing in memory

edit

From the point of view of the CPU, machine code is stored in RAM, but is typically also kept in a set of caches for performance reasons. There may be different caches for instructions and data, depending on the architecture.[25]

In some systems, from the point of view of a process, the machine code lives in code space, a designated part of its address space. In a multi-threading environment, different threads of one process share code space along with data space, which reduces the overhead of context switching considerably as compared to process switching.[26]

The CPU knows what machine code to execute, based on its internal program counter.[27] The program counter points to a memory address and is changed based on special instructions which may cause programmatic branches.[28] The program counter is typically set to a hard coded value when the CPU is first powered on, and will hence execute whatever machine code happens to be at this address.[29]

Similarly, the program counter can be set to execute whatever machine code is at some arbitrary address, even if this is not valid machine code.[28] This will typically trigger an architecture specific protection fault.[30]

In a paging based system, the CPU is oftentimes told if the current page actually holds machine code by an execute bit — pages have multiple such permission bits (readable, writable, etc.) for various housekeeping functionality.[30] E.g. on Unix-like systems memory pages can be toggled to be executable with the mprotect() system call,[31] and on Windows, VirtualProtect() can be used to achieve a similar result.[32] If an attempt is made to execute machine code on a non-executable page, an architecture specific fault will typically occur.[30]

Similarly, in a segment based system, segment descriptors can indicate whether a segment can contain executable code and in what rings that code can run.[33]

In systems that lack this kind of protection, treating data as machine code, or finding new ways to use existing machine code, by various techniques, is the basis of some software exploits. For example, in Super Mario Bros. 3, manipulating the game's memory to resemble a jump instruction then forcing the game to execute that memory as code allows the player to win the game instantly.[34]

Readability by humans

edit

Machine code can be seen as a set of electrical pulses that make the instructions readable to the computer; it is not readable by humans,[35] with Douglas Hofstadter comparing it to examining the atoms of a DNA molecule.[36] However, various tools and methods exist to decode machine code to human-readable source code. One such method is disassembly, which easily decodes it back to its corresponding assembly language source code because assembly language forms a one-to-one mapping to machine code.[37]

Machine code may also be decoded to high-level language under two conditions. The first condition is to accept an obfuscated reading of the source code. An obfuscated version of source code is displayed if the machine code is sent to a decompiler of the source language. The second condition requires the machine code to have information about the source code encoded within. The information includes a symbol table that contains debug symbols. The symbol table may be stored within the executable, or it may exist in separate files. A debugger can then read the symbol table to help the programmer interactively debug the machine code in execution.

See also

edit

Notes

edit
  1. ^ On nonbinary machines it is, e.g., a decimal representation.
  2. ^ On early decimal machines, patterns of characters, digits and digit sign
  3. ^ a b While overlapping instructions on processor architectures with variable-length instruction sets can sometimes be arranged to merge different code paths back into one through control-flow resynchronization, overlapping code for different processor architectures can sometimes also be crafted to cause execution paths to branch into different directions depending on the underlying processor, as is sometimes used in fat binaries.
  4. ^ For example, the DR-DOS master boot records (MBRs) and boot sectors (which also hold the partition table and BIOS Parameter Block, leaving less than 446 respectively 423 bytes for the code) were traditionally able to locate the boot file in the FAT12 or FAT16 file system by themselves and load it into memory as a whole, in contrast to their counterparts in MS-DOS and PC DOS, which instead rely on the system files to occupy the first two directory entry locations in the file system and the first three sectors of IBMBIO.COM to be stored at the start of the data area in contiguous sectors containing a secondary loader to load the remainder of the file into memory (requiring SYS to take care of all these conditions). When FAT32 and logical block addressing (LBA) support was added, Microsoft even switched to require i386 instructions and split the boot code over two sectors for code size reasons, which was no option to follow for DR-DOS as it would have broken backward- and cross-compatibility with other operating systems in multi-boot and chain load scenarios, and as with older IBM PC–compatible PCs. Instead, the DR-DOS 7.07 boot sectors resorted to self-modifying code, opcode-level programming in machine language, controlled utilization of (documented) side effects, multi-level data/code overlapping and algorithmic folding techniques to still fit everything into a physical sector of only 512 bytes without giving up any of their extended functions.

References

edit
  1. ^ Stallings, William (2015). Computer Organization and Architecture 10th edition. Pearson Prentice Hall. p. 776. ISBN 9789332570405.
  2. ^ a b c Tanenbaum 1990, p. 251
  3. ^ Tanenbaum 1990, p. 162
  4. ^ Tanenbaum 1990, p. 231
  5. ^ Tanenbaum 1990, p. 237
  6. ^ Tanenbaum 1990, p. 236
  7. ^ a b Tanenbaum 1990, p. 253
  8. ^ Tanenbaum 1990, p. 283
  9. ^ Dourish, Paul (2004). Where the Action is: The Foundations of Embodied Interaction. MIT Press. p. 7. ISBN 0-262-54178-5. Retrieved 2025-08-07.
  10. ^ Zaks, Rodnay (1982). Programming the Z80 (Third Revised ed.). Sybex. pp. 67, 120, 609. ISBN 0-89588-094-6. Retrieved 2025-08-07.
  11. ^ a b c d e Harris, David; Harris, Sarah L. (2007). Digital Design and Computer Architecture. Morgan Kaufmann Publishers. ISBN 978-0-12-370497-9. Retrieved 2025-08-07.
  12. ^ a b c d e Jacob, Matthias; Jakubowski, Mariusz H.; Venkatesan, Ramarathnam [at Wikidata] (20–21 September 2007). Towards Integral Binary Execution: Implementing Oblivious Hashing Using Overlapped Instruction Encodings (PDF). Proceedings of the 9th workshop on Multimedia & Security (MM&Sec '07). Dallas, Texas, US: Association for Computing Machinery. pp. 129–140. CiteSeerX 10.1.1.69.5258. doi:10.1145/1288869.1288887. ISBN 978-1-59593-857-2. S2CID 14174680. Archived (PDF) from the original on 2025-08-07. Retrieved 2025-08-07. (12 pages)
  13. ^ Lagarias, Jeffrey "Jeff" Clark; Rains, Eric Michael; Vanderbei, Robert J. (2009) [2025-08-07]. "The Kruskal Count". In Brams, Stephen; Gehrlein, William V.; Roberts, Fred S. (eds.). The Mathematics of Preference, Choice and Order. Studies in Choice and Welfare. Berlin / Heidelberg, Germany: Springer-Verlag. pp. 371–391. arXiv:math/0110143. doi:10.1007/978-3-540-79128-7_23. ISBN 978-3-540-79127-0. (22 pages)
  14. ^ Andriesse, Dennis; Bos, Herbert [at Wikidata] (2025-08-07). Written at Vrije Universiteit Amsterdam, Amsterdam, Netherlands. Dietrich, Sven (ed.). Instruction-Level Steganography for Covert Trigger-Based Malware (PDF). 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Lecture Notes in Computer Science. Egham, UK; Switzerland: Springer International Publishing. pp. 41–50 [45]. doi:10.1007/978-3-319-08509-8_3. eISSN 1611-3349. ISBN 978-3-31908508-1. ISSN 0302-9743. S2CID 4634611. LNCS 8550. Archived (PDF) from the original on 2025-08-07. Retrieved 2025-08-07. (10 pages)
  15. ^ a b Jakubowski, Mariusz H. (February 2016). "Graph Based Model for Software Tamper Protection". Microsoft. Archived from the original on 2025-08-07. Retrieved 2025-08-07.
  16. ^ J?mthagen, Christopher (November 2016). On Offensive and Defensive Methods in Software Security (PDF) (Thesis). Lund, Sweden: Department of Electrical and Information Technology, Lund University. p. 96. ISBN 978-91-7623-942-1. ISSN 1654-790X. Archived (PDF) from the original on 2025-08-07. Retrieved 2025-08-07. (1+xvii+1+152 pages)
  17. ^ a b "Unintended Instructions on x86". Hacker News. 2021. Archived from the original on 2025-08-07. Retrieved 2025-08-07.
  18. ^ Kinder, Johannes (2025-08-07). Static Analysis of x86 Executables [Statische Analyse von Programmen in x86 Maschinensprache] (PDF) (Dissertation). Munich, Germany: Technische Universit?t Darmstadt. D17. Archived from the original on 2025-08-07. Retrieved 2025-08-07. (199 pages)
  19. ^ "What is "overlapping instructions" obfuscation?". Reverse Engineering Stack Exchange. 2025-08-07. Archived from the original on 2025-08-07. Retrieved 2025-08-07.
  20. ^ Gates, William "Bill" Henry, Personal communication (NB. According to Jacob et al.)
  21. ^ Shacham, Hovav (2007). The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) (PDF). Proceedings of the ACM, CCS 2007. ACM Press. Archived (PDF) from the original on 2025-08-07. Retrieved 2025-08-07.
  22. ^ Kent, Allen; Williams, James G. (2025-08-07). Encyclopedia of Computer Science and Technology: Volume 28 - Supplement 13: AerosPate Applications of Artificial Intelligence to Tree Structures. CRC Press. pp. 33–34. ISBN 978-0-8247-2281-4.
  23. ^ Tucker, S. G. (2025-08-07). "Microprogram control for SYSTEM/360". IBM Systems Journal. 6 (4): 222–241. doi:10.1147/sj.64.0222. ISSN 0018-8670 – via IEEE Xplore.
  24. ^ Gregory, Kate (2025-08-07). "Managed, Unmanaged, Native: What Kind of Code Is This?". Developer.com. Archived from the original on 2025-08-07. Retrieved 2025-08-07.
  25. ^ Su, Chao; Zeng, Qingkai (2021). "Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures". Security and Communication Networks. 2021 (1): 5559552. doi:10.1155/2021/5559552. ISSN 1939-0122.
  26. ^ "CS 537 Notes, Section #3A: Processes and Threads". pages.cs.wisc.edu. School of Computer, Data & Information Sciences, University of Wisconsin-Madison. Retrieved 2025-08-07.
  27. ^ Hayes, John Patrick (1978). Computer Architecture and Organization. McGraw-Hill. p. 245. ISBN 978-0-07-027363-4.
  28. ^ a b Principles of Operation, Type 701 and Associated Equipment (PDF). IBM. 1953. pp. 23–24.
  29. ^ Bates, Martin (2025-08-07). PIC Microcontrollers: An Introduction to Microelectronics. Elsevier. p. 30. ISBN 978-0-08-096911-4.
  30. ^ a b c Intel? 64 and IA-32 Architectures Software Developer's Manual, Volume 3A: System Programming Guide, Part 1 (PDF). Intel. September 2016. pp. 4-31 – 4-32, 5-2 – 5-3.
  31. ^ "mprotect(2) - Linux manual page". www.man7.org. Retrieved 2025-08-07.
  32. ^ karl-bridge-microsoft. "VirtualProtect function (memoryapi.h) - Win32 apps". learn.microsoft.com. Retrieved 2025-08-07.
  33. ^ Daniel Tabak (1995). Advanced microprocessors. Internet Archive. McGraw-Hill. p. 149. ISBN 978-0-07-062843-4.
  34. ^ Retro Game Mechanics Explained (2025-08-07). Super Mario Bros. 3 - Wrong Warp. Retrieved 2025-08-07 – via YouTube.
  35. ^ Samuelson 1984, p. 683.
  36. ^ Hofstadter 1979, p. 290.
  37. ^ Tanenbaum 1990, p. 398.
  38. ^ "Associated Data Architecture". High Level Assembler and Toolkit Feature.
  39. ^ "Associated data file output" (PDF). High Level Assembler for z/OS & z/VM & z/VSE - 1.6 -HLASM Programmer's Guide (PDF) (Eighth ed.). IBM. October 2022. pp. 278–332. SC26-4941-07. Retrieved 2025-08-07.
  40. ^ "COBOL SYSADATA file contents". Enterprise COBOL for z/OS.
  41. ^ "SYSADATA message information". Enterprise PL/I for z/OS 6.1 information. 2025-08-07.
  42. ^ "Appendix C. Generalized object file format (GOFF)" (PDF). z/OS - 3.1 - MVS Program Management: Advanced Facilities (PDF). IBM. 2025-08-07. pp. 201–240. SA23-1392-60. Retrieved 2025-08-07.
  43. ^ "Symbols for Windows debugging". Microsoft Learn. 2025-08-07.
  44. ^ "Querying the .Pdb File". Microsoft Learn. 2025-08-07.

Sources

edit

Further reading

edit
今年什么生肖 晚上吃什么水果减肥效果最好 生肖龙和什么生肖相冲 4月17日是什么星座 草字头加全念什么
乳腺结节有什么症状 切忌是什么意思 增强ct是什么意思 5月7日是什么星座 月经突然停止是什么原因
血糖偏高吃什么食物好 肛门周边瘙痒擦什么药 来月经吃什么排得最干净 一案双查是什么意思 清五行属什么
猪咳嗽用什么药效果好 大修基金什么时候缴纳 蚂蚁上树是什么菜 造影是什么手术 原味是什么意思
梦见豹子是什么预兆beikeqingting.com 转氨酶高吃什么药最好hcv9jop2ns3r.cn 毕业礼物送什么hcv8jop0ns7r.cn 君子菜是什么蔬菜tiangongnft.com d3什么时候吃效果最好zhongyiyatai.com
风暴是什么意思hcv8jop5ns3r.cn dia是什么意思hcv9jop1ns6r.cn 馥是什么意思hcv9jop0ns4r.cn 有机会是什么意思hcv9jop0ns5r.cn 西洋参适合什么人吃hcv7jop7ns3r.cn
王禹读什么hcv9jop0ns7r.cn 慢性盆腔炎吃什么药效果好creativexi.com 女性雄激素过高是什么原因引起的hcv7jop7ns0r.cn 水猴子长什么样子hcv8jop3ns9r.cn 表白墙是什么hcv8jop5ns9r.cn
9月24日是什么星座hcv9jop4ns9r.cn 吃完饭胃疼是什么原因hcv9jop6ns1r.cn 脚后跟骨头疼是什么原因hcv8jop3ns4r.cn 危楼是什么意思hcv7jop9ns3r.cn 一桌餐是什么意思cl108k.com
百度