Finally we present an important observation known as

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: on compiler design [52] is considered the most comprehensive reference on code optimization techniques. It covers many of the techniques we discuss here, such as register usage conventions and the advantages of generating code for loops based on their do-while form. Much has been written about the use of buffer overflow to attack systems over the Internet. Detailed analyses of the 1988 Internet worm have been published by Spafford [69] as well as by members of the team at MIT who helped stop its spread [24]. Since then, a number of papers and projects have generated about both creating and preventing buffer overflow attacks, such as [19]. Homework Problems Homework Problem 3.31 [Category 1]: You are given the following information. A function with prototype int decode2(int x, int y, int z); is compiled into assembly code. The body of the code is as follows: 194 1 2 3 4 5 6 7 8 CHAPTER 3. MACHINE-LEVEL REPRESENTATION OF C PROGRAMS movl 16(%ebp),%eax movl 12(%ebp),%edx subl %eax,%edx movl %edx,%eax imull 8(%ebp),%edx sall $31,%eax sarl $31,%eax xorl %edx,%eax Parameters x, y, and z are stored at memory...
View Full Document

This note was uploaded on 09/02/2010 for the course ELECTRICAL 360 taught by Professor Schultz during the Spring '10 term at BYU.

Ask a homework question - tutors are online