X86 instructions

Results: 281



#Item
11  FROM RING3 TO RING0: EXPLOITING THE XEN X86 INSTRUCTION EMULATOR Andrei Vlad Luțaș Bitdefender

1 FROM RING3 TO RING0: EXPLOITING THE XEN X86 INSTRUCTION EMULATOR Andrei Vlad Luțaș Bitdefender

Add to Reading List

Source URL: labs.bitdefender.com

Language: English - Date: 2016-01-22 04:06:36
2Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2015-08-21 02:18:30
3Megaprocessor -Instruction Set James Newman May 2016

Megaprocessor -Instruction Set James Newman May 2016

Add to Reading List

Source URL: megaprocessor.com

Language: English - Date: 2016-05-15 10:12:42
4Chapter 8  Exceptional Control Flow From the time you first apply power to a processor until the time you shut it off, the program counter assumes a sequence of values a0 , a1 , . . . , an−1

Chapter 8 Exceptional Control Flow From the time you first apply power to a processor until the time you shut it off, the program counter assumes a sequence of values a0 , a1 , . . . , an−1

Add to Reading List

Source URL: csapp.cs.cmu.edu

Language: English - Date: 2010-02-14 14:17:30
5Knights Landing (KNL): 2nd Generation Intel® Xeon Phi™ Processor Avinash Sodani KNL Chief Architect Senior Principal Engineer, Intel Corp.

Knights Landing (KNL): 2nd Generation Intel® Xeon Phi™ Processor Avinash Sodani KNL Chief Architect Senior Principal Engineer, Intel Corp.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2015-08-21 02:18:27
6Analysts’ Presentation Results FY 2014 May 26, 2015 Minds + Machines Group Limited (MMX)  1

Analysts’ Presentation Results FY 2014 May 26, 2015 Minds + Machines Group Limited (MMX) 1

Add to Reading List

Source URL: mmx.co

Language: English - Date: 2015-11-30 15:05:28
7Intel Architecture Software Developer’s Manual Volume 1: Basic Architecture

Intel Architecture Software Developer’s Manual Volume 1: Basic Architecture

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 2005-03-23 22:57:42
8You	
  are	
  responsible	
  for	
  the	
  material	
  contained	
   on	
  the	
  following	
  slides,	
  though	
  we	
  may	
  not	
  have	
   enough	
  9me	
  to	
  get	
  to	
  them	
  in	
  le

You  are  responsible  for  the  material  contained   on  the  following  slides,  though  we  may  not  have   enough  9me  to  get  to  them  in  le

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2014-02-04 15:27:40
9CS:APP2e Web Aside ASM:SSE: SSE-Based Support for Floating Point∗ Randal E. Bryant David R. O’Hallaron August 5, 2014

CS:APP2e Web Aside ASM:SSE: SSE-Based Support for Floating Point∗ Randal E. Bryant David R. O’Hallaron August 5, 2014

Add to Reading List

Source URL: csapp.cs.cmu.edu

Language: English - Date: 2014-08-05 12:50:10
10Symbolic Crosschecking of Floating-Point and SIMD Code Peter Collingbourne Cristian Cadar  Paul H. J. Kelly

Symbolic Crosschecking of Floating-Point and SIMD Code Peter Collingbourne Cristian Cadar Paul H. J. Kelly

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2016-03-08 07:04:45