Reversing : The Hacker's Guide to Reverse Engineering

(ff) #1
Index 575

box, 432
br, 432
call, 431
div, 432
ldarg, 431
ldc, 431
ldfld, 431
ldloc, 431
mul, 432
newarr, 433
newobj, 433
ret, 431
starg, 431
stfld, 431
stloc, 431
sub, 432
switch, 432
unbox, 432
int 3instruction, 331
integer overflows, 256–260
Intel
assembly language notation, 49
C++ Compiler version 8.0, 59–60
LaGrande Technology Architectural
Overview, 319
NetBurst microarchitecture, 65–67
intellectual property, 310
Interactive Disassembler (IDA),
112–115, 121
interleaving code, 354–355
Intermediate Language (IL)
activation records, 430
addinstruction, 432
beqinstruction, 432
bgeinstruction, 432
bgtinstruction, 432
bleinstruction, 432
bltinstruction, 432
bneinstruction, 432
boxinstruction, 432
brinstruction, 432
C#, 36–37

callinstruction, 431
code samples
counting items, 433–435
linked lists, 436–443
details, 424
divinstruction, 432
evaluation stack, 430
ldarginstruction, 431
ldcinstruction, 431
ldfldinstruction, 431
ldlocinstruction, 431
mulinstruction, 432
.NET executables, 429
newarrinstruction, 433
newobjinstruction, 433
retinstruction, 431
starginstruction, 431
stfldinstruction, 431
stlocinstruction, 431
subinstruction, 432
switchinstruction, 432
unboxinstruction, 432
intermediate representations, 55–56,
459–460
internal functions, 487
interoperability, 8, 17, 142
interpreters, 61–62
intrinsic string-manipulation func-
tions, 249–250
I/O system (Windows operating
system), 103–104
IsDebuggerPresentWindows
API, 332–333

J
J#, 428
Jaffe, Joshua, “Differential Power
Analysis”, 319
Java, 36, 423
Java Virtual Machine (JVM), 60
Jccinstructions, 51
JiTs (just-in-time compilers), 62

24_574817 bindex.qxd 3/23/05 5:26 PM Page 575

Free download pdf