- Mastering Reverse Engineering
- Reginald Wong
- 135字
- 2021-06-10 19:40:30
Memory addressing
The start of a piece of data, a series of bytes, stored in the memory can be located using its memory address. Every byte stored in the memory is assigned a memory address that identifies its location. When a program is executed by a user, the executable file is read, then mapped by the system to an allocated memory address. The executable file contains information on how it maps it, so that all executable code is in the code section, all initialized data is in the data section, and uninitialized data is in the BSS section. Code instructions found in the code section are able to access data in the data section using memory addresses, which can be hard-coded. Data can also be a list of addresses pointing to another set of data.
推薦閱讀
- RESTful Java Web Services Security
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- 信息安全導(dǎo)論(在線實(shí)驗(yàn)+在線自測)
- SASE原理、架構(gòu)與實(shí)踐
- Metasploit Penetration Testing Cookbook(Second Edition)
- Kali Linux Social Engineering
- 大型互聯(lián)網(wǎng)企業(yè)安全架構(gòu)
- Practical Network Scanning
- 信息安全等級保護(hù)測評與整改指導(dǎo)手冊
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應(yīng)用與數(shù)據(jù)安全
- Mastering Python for Networking and Security
- Kali Linux高級滲透測試(原書第4版)
- 云計(jì)算安全防護(hù)技術(shù)
- Securing Network Infrastructure
- Metasploit 5.0 for Beginners