Reversing : The Hacker's Guide to Reverse Engineering

(ff) #1
Figure A.13 Effects of function-level working-set tuning on code placement in binary
executables.

Function1 (Medium Popularity)
Function1_Condition1 (Frequently Executed)
Function1_Condition2 (Sometimes Executed)
Function1_Condition3 (Frequently Executed)

Function3 (High Popularity)
Function3_Condition1 (Sometimes Executed)
Function3_Condition2 (Rarely Executed)
Function3_Condition3 (Frequently Executed)

Function2 (Low Popularity)
Function2_Condition1 (Rarely Executed)
Function2_Condition2 (Sometimes Executed)

Function1 (Medium Popularity)
Function1_Condition1 (Frequently Executed)
Function1_Condition2 (Sometimes Executed)
Function1_Condition3 (Frequently Executed)

Function3 (High Popularity)
Function3_Condition1 (Sometimes Executed)
Function3_Condition2 (Rarely Executed)
Function3_Condition3 (Frequently Executed)

Function2 (Low Popularity)
Function2_Condition1 (Rarely Executed)
Function2_Condition2 (Sometimes Executed)

Beginning of
Module

Beginning of
Module

End of Module

End of Module

Deciphering Code Structures 517

21_574817 appa.qxd 3/16/05 8:54 PM Page 517

Free download pdf