X86 assembly language

Results: 187



#Item
41Automatic Generation of Peephole Superoptimizers Sorav Bansal and Alex Aiken Computer Systems Lab Stanford University {sbansal, aiken}@cs.stanford.edu

Automatic Generation of Peephole Superoptimizers Sorav Bansal and Alex Aiken Computer Systems Lab Stanford University {sbansal, aiken}@cs.stanford.edu

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2006-08-01 01:50:46
42March 2012 White Paper: “Police trojan” study Marcin “Icewall” Noga

March 2012 White Paper: “Police trojan” study Marcin “Icewall” Noga

Add to Reading List

Source URL: hispasec.com

Language: English - Date: 2013-11-07 06:14:53
43A FPGA based Forth microprocessor P. H. W. Leong, P. K. Tsang and T. K. Lee Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T. Hong Kong Systems which employ a microprocessor

A FPGA based Forth microprocessor P. H. W. Leong, P. K. Tsang and T. K. Lee Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T. Hong Kong Systems which employ a microprocessor

Add to Reading List

Source URL: home.claranet.nl

Language: English - Date: 2008-07-18 17:49:45
44Imperial College London Department of Computing Computer Systems (M2) Pentium programming – lab exercise You’ll learn more about assembly language programming as the course progresses. In the meantime you’re encour

Imperial College London Department of Computing Computer Systems (M2) Pentium programming – lab exercise You’ll learn more about assembly language programming as the course progresses. In the meantime you’re encour

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-11-20 09:55:10
45Relational database management systems / Procedural programming languages / C / Oracle Database / HTML / Java / SQL / Reflection / X86 assembly language / Computing / Software engineering / Cross-platform software

Moisés D. Díaz. _www.moisesdaniel.com_ Reflective Architectures and Code GenerationLet’s start with an example: AnotherAmazon.com .

Add to Reading List

Source URL: www.moisesdaniel.com

Language: English - Date: 2007-06-17 11:21:02
46New Results for Timing-Based Attestation

New Results for Timing-Based Attestation

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2012-05-22 01:34:12
47Automatic Extraction of Secrets from Malware Ziming Zhao, Gail-Joon Ahn and Hongxin Hu Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Tempe, AZ 85281, USA {zmzhao, gahn, hxhu}@

Automatic Extraction of Secrets from Malware Ziming Zhao, Gail-Joon Ahn and Hongxin Hu Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Tempe, AZ 85281, USA {zmzhao, gahn, hxhu}@

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2011-09-01 00:19:23
48A No-Frills Introduction to Lua 5.1 VM Instructions by Kein-Hong Man, esq. <khman AT users.sf.net> Version 0.1, Contents 1

A No-Frills Introduction to Lua 5.1 VM Instructions by Kein-Hong Man, esq. Version 0.1, Contents 1

Add to Reading List

Source URL: underpop.free.fr

Language: English - Date: 2010-07-09 12:16:33
49CN  No Duh! Guide to TI-83/+ Programming -PRESS-

CN No Duh! Guide to TI-83/+ Programming -PRESS-

Add to Reading List

Source URL: www.ticalc.org

Language: English - Date: 2001-08-03 01:37:11
50BitBlaze: A New Approach to Computer Security via Binary Analysis Dawn Song1 , David Brumley2, Heng Yin1,2,3 , Juan Caballero1,2, Ivan Jager2 , Min Gyung Kang1,2 , Zhenkai Liang2 , James Newsome2 , Pongsin Poosankam1,2,

BitBlaze: A New Approach to Computer Security via Binary Analysis Dawn Song1 , David Brumley2, Heng Yin1,2,3 , Juan Caballero1,2, Ivan Jager2 , Min Gyung Kang1,2 , Zhenkai Liang2 , James Newsome2 , Pongsin Poosankam1,2,

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2012-07-11 06:21:50