|
You are here |
www.cs.virginia.edu | ||
| | | | |
gpfault.net
|
|
| | | | | [AI summary] The text provides an in-depth exploration of various x86-64 instruction set architectures, focusing on arithmetic operations (ADD, SUB, MUL, SMUL, DIV, SDIV), logical operations (AND, OR, XOR, NOT), and control flow instructions. It details the implementation of these instructions in the QBX virtual machine, emphasizing how they emulate real x86-64 instructions while managing the flags register and handling different operand sizes (8-bit and 16-bit). The text also discusses the nuances of flag handling, register operations, and macro-based code generation to streamline instruction implementation. | |
| | | | |
mcyoung.xyz
|
|
| | | | | [AI summary] The article provides an in-depth exploration of computer architecture and assembly language, focusing on the RISC-V Instruction Set Architecture (ISA). It covers fundamental concepts such as machine words, registers, and the role of assembly language as a human-readable representation of machine instructions. The text explains how programs are structured using instructions, labels, and directives, and categorizes instructions into arithmetic, memory, control flow, and miscellaneous types. It also delves into the calling convention, which defines how functions are called and how data is passed between them, and highlights the importance of maintaining the call stack illusion. The article further discusses the practical implications of these conce... | |
| | | | |
0x44.cc
|
|
| | | | | [AI summary] The article provides an in-depth explanation of reverse engineering concepts, including CPU operations, memory representation, data structures, and disassembly techniques. It guides readers through understanding machine code, endianness, signed integers, and how to analyze C code using tools like Visual Studio and disassemblers. | |
| | | | |
notes.eatonphil.com
|
|
| | | Emulating linux/AMD64 userland: interpreting an ELF binary | ||