<--- Back to Details
First PageDocument Content
Compiler construction / Programming language implementation / Search algorithms / Error detection and correction / Relocation / Dynamic linker / Portable Executable / Library / Linker / Software / Computing / Computer programming
Compiler construction
Programming language implementation
Search algorithms
Error detection and correction
Relocation
Dynamic linker
Portable Executable
Library
Linker
Software
Computing
Computer programming

Add to Reading List

Source URL: people.redhat.com

Download Document from Source Website

Share Document on Facebook

Similar Documents

Computing / Software / Computer programming / Programming language implementation / Compiler construction / Compilers / Debugging / Object file / Linker / Weak symbol / Dynamic linker / Relocation

Chapter 7 Linking Linking is the process of collecting and combining various pieces of code and data into a single file that can be loaded (copied) into memory and executed. Linking can be performed at compile time, whe

DocID: 1pVps - View Document

Programming language implementation / Portable Executable / Executable and Linkable Format / UNIX System V / Unix / Object file / Executable / Dynamic linker / Library / Debuggers / Relocatable Object Module Format / COFF

Tool Interface Standard (TIS) Portable Formats Specification Version 1.1 TIS Committee October 1993

DocID: 1pKTE - View Document

Programming language implementation / Compilers / Computer file formats / Dynamic linker / Dynamic loading / Data types / Library / Linker / Relocation / Portable Executable / Loader / Position-independent code

Cheating the ELF Subversive Dynamic Linking to Libraries the grugq Abstract: Development of feature rich Unix parasites has been severely limited by the inability to reliably access functions external to the host file. U

DocID: 1pleQ - View Document

Programming language implementation / Compilers / Compiler construction / Loader / Library / Static library / Linker / Position-independent code / Portable Executable / Dynamic linker / Relocation / Software

Safe Loading - A Foundation for Secure Execution of Untrusted Programs Mathias Payer ETH Zurich, Switzerland Tobias Hartmann ETH Zurich, Switzerland

DocID: 1nOwm - View Document

Computing / Software / Software bugs / Programming language implementation / Subroutines / Portable Executable / Position-independent code / Object file / Dynamic linker / Stack buffer overflow / Buffer overflow / Return-to-libc attack

Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

DocID: 1mDhJ - View Document