This preview shows page 1. Sign up to view the full content.
Unformatted text preview: on compiler design  is considered the most comprehensive reference on code optimization techniques. It covers many of the techniques we discuss here, such as register usage conventions and the advantages of generating code for loops based on their do-while form. Much has been written about the use of buffer overﬂow to attack systems over the Internet. Detailed analyses of the 1988 Internet worm have been published by Spafford  as well as by members of the team at MIT who helped stop its spread . Since then, a number of papers and projects have generated about both creating and preventing buffer overﬂow attacks, such as . Homework Problems
Homework Problem 3.31 [Category 1]: You are given the following information. A function with prototype
int decode2(int x, int y, int z); is compiled into assembly code. The body of the code is as follows: 194
1 2 3 4 5 6 7 8 CHAPTER 3. MACHINE-LEVEL REPRESENTATION OF C PROGRAMS
movl 16(%ebp),%eax movl 12(%ebp),%edx subl %eax,%edx movl %edx,%eax imull 8(%ebp),%edx sall $31,%eax sarl $31,%eax xorl %edx,%eax Parameters x, y, and z are stored at memory...
View Full Document
This note was uploaded on 09/02/2010 for the course ELECTRICAL 360 taught by Professor Schultz during the Spring '10 term at BYU.
- Spring '10
- The American