2018-2019-1 20165210 "Information Security system Design Fundamentals" 4th Week study summary Textbook Learning content Summary ISA
Concept:
The byte-level encoding of a processor-supported instruction and instruction is called its instruction set architecture Isa.While the processor performance and complexity of each manufacturer is increasing, the different models remain compatible at the IS
20145311 "Information Security system Design Fundamentals" The 14th Week study summary textbook Learning content Summary1. Physical AddressingThe main memory of a computer system is organized into an array of cells consisting of m contiguous byte sizes. Each byte has a unique physical address of Pa. The address of the first byte is 0, the next byte has an address of 1, the next is 2, and so on. Given this s
2018-2019-1 20165329 "Information Security system Design Fundamentals" 4th Week Study SummarySummary of learning contents of textbook
Y86-64 directive: The y86-64 instruction is a subset of the x86-84 instruction set. It includes only 8-byte integer operations. There are 4 integer operations directives: ADDQ, SUBQ, ANDQ, and Xorq. There are 7 jump commands: jmp, Jle, JL, je, jne, Jge, and JG. There are
20165214 2018-2017-1 "Information Security system Design Fundamentals" The third week study summary of learning Contents1. In fact, the GCC command invokes a series of programs that convert the source code into executable code.2, the actual realization of the memory system is to combine multiple hardware memory and operating system software.3. ISA: Instruction set architecture, which defines the state of th
2018-2019 20165227 "Information Security system Design Fundamentals" The third week to learn to summarize learning objectives
Understanding the concept of reverse
Master X86 compilation base, able to read (reverse) Assembly code
Understanding ISA (Instruction set architecture)
Understand the concept of function call stack frames and can debug with GDB
Learning tasks
What y
2018-2019-1 20165228 "Fundamentals of Information Security system design" the third week of learning summary of the Learning Content Summary program machine-level representation: Two important abstractions of computer systems
ISA (Instruction set architecture): Instruction set architecture, machine-level program format and behavior. Defines the format of the processor status directives and the effe
2018-2019-1 20165333 "Information Security system Design Fundamentals" Third Week study summarySummary of learning contents of textbookThe machine-level representation of the program:Two important abstractions of computer systemsISA (Instruction set architecture): Instruction set architecture, machine-level program format and behavior. Defines the format of the processor status directives and the effect of
2018-2019-1 20165336 "Information Security system Design Fundamentals" Fourth week study summary 1. The knowledge points learned in the textbook
The states that are visible to programmers (assembler programmers, compilers, and so on) in y86-64 include program registers, condition codes, program states, program counters (PCS), memory
Y86-64 15 Program registers are%eax%ecx%edx%ebx%esp%ebp%esi%eadi ZF S
20145317 "Information Security system Design Fundamentals" 7th Week study summary 1 Textbook Learning content SummaryBasic storage technology: SRAM memory DRAM memory ROM memory rotary hard drive SSD1. Storage TechnologyThree common storage technologies: ram/rom/disk( 1 ) random access memory RAM
Two categories: Static RAM (SRAM) and dynamic RAM (DRAM)
Static RAM (SRAM) is faster, but much more
20145311 "Information Security system Design Fundamentals" The sixth Week study summary textbook Learning content SummaryThe tables in the book are still very important.
A program is compiled to run on one machine and cannot be run on another machineRegister%ESP are stack pointers, stack, call, and return instructionsProgram Counter PC holds the address of the currently executing instructionThe three-bi
can not open, Later according to Zhangxiaohan classmate blog written steps to do, finally installed successfully.Learning progress Bar
lines of code (new /Cumulative)
Blog volume ( new/cumulative)
Learning time (new/cumulative)
Important growth
Goal
3000 rows
30 Articles
300 hours
First week
0/0
1/2
25/40
Learn Linux basics and Core commands
Second week
0/0
0/2
construction methodPrivateSingletontest () {}Defines a static private variable (uninitialized, does not use the final keyword, and volatile guarantees the visibility of the instance variable when multi-threaded access is avoided, and is called by another thread when the other variable property is not assigned when instance initialized)Privatestatic volatile singletontest instance;//defines a common static method that returns an instance of this type public Span style= "COLOR: #0000ff" >static S
processor design, it is often necessary to compare a signal to a number of possible matching signals to detect if a certain instruction code being processed is part of a class of instruction code.Sequential implementation of Y86-64Organize the processing into stages1. For OPL (integer and logical Operations), RRMOVL (register-register transfer) and IRMOVL (immediate count-register transfer)2. For RMMOVL and Mrmov3. For PUSHL and POPL4. For jump, call
a logic gate based on the individual bits of the input word.In the HCL, we declare all word-level signals as int, without specifying the size of the wordIn the HCL, a multiplexed function is described using a condition expression. Each case I has a Boolean expression select and an integer expression, expr. The former indicates when to choose this case, the latter represents the resulting valueThe Arithmetic/logic unit (ALU) is a very important combination circuit. This circuit has 3 inputs: two
architectureHow is the sequence of processor architectures implemented?fifth. Optimizing Program PerformanceHow does the compiler generate efficient code, and what short board does he have?Sixth chapter Memory hierarchyHow to determine if a memory unit is in steady stateSeventh Chapter LinksWhen and how can a link be done?eighth. Abnormal control FlowHow does exception control flow work at every level of the computer?nineth Chapter Virtual MemoryWhat are the three important features that virtua
path does not appear in Chinese, the component, the patch package and the main body need to be installed under the same path. And then you need to start cracking. (But I already have the Quartus II 11.0 program on my computer in my previous studies)The work required for each program
Program Quartus II 11.0 Open the experimental file, follow the instructions in the experiment instructions to complete the compilation, configuration pins and other work
Connect the Lab box.
FPGA experime
Floating-point arithmeticIEEE floating point representation: v= ( -1) s x M x 2E (sign S, Mantissa M, order E)Round to even (default): Rounds a number up or down, and the least significant number of results is even. Can be used in binary decimals.Rounds to 0: rounds the integer down, and the negative number rounds up.Round down: Both positive and negative numbers are rounded down.Round up: Both positive and negative numbers are rounded up.Code hosting other (sentiment, thinking, etc., opti
parent process is the same as the Descriptor table, file table, V-note tables correspondence and child processes. Descriptor FD points to the same file table entry in the parent-child process. So when the child process has finished reading, the parent process reads O, and the output O10.4:Dup2 (A, A, b) refers to the redirection of a to a, and a copy to the B standard input descriptor is 010.5:Dup2 (FD2,FD1) fd2 Copy to Fd1,fd1 is redirected to FD2. So after performing the read again, the outpu
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.