|
You are here |
blog.mantrainfosec.com | ||
| | | | |
www.corellium.com
|
|
| | | | | iOS applications are distributed as compiled binaries and are not readable by default. Click the blog to learn what goes into iOS reverse engineering. | |
| | | | |
www.basicinputoutput.com
|
|
| | | | | A blog about UEFI BIOS C programming software development engineering computer science history | |
| | | | |
www.shogunlab.com
|
|
| | | | | Welcome to the second part in a tutorial series on reverse engineering Windows binaries with Ghidra! In this post, we'll be building on the concepts we learned in Part 0 and introduce some new topics | |
| | | | |
mcyoung.xyz
|
|
| | | [AI summary] The article provides an in-depth exploration of computer architecture and assembly language, focusing on the RISC-V Instruction Set Architecture (ISA). It covers fundamental concepts such as machine words, registers, and the role of assembly language as a human-readable representation of machine instructions. The text explains how programs are structured using instructions, labels, and directives, and categorizes instructions into arithmetic, memory, control flow, and miscellaneous types. It also delves into the calling convention, which defines how functions are called and how data is passed between them, and highlights the importance of maintaining the call stack illusion. The article further discusses the practical implications of these conce... | ||