Reversing : The Hacker's Guide to Reverse Engineering

(ff) #1
Figure C.3 Doubly linked list layout—logically and in memory.

Item 1 DataMemory
Item 1 Next Pointer

Item 2 Data
Item 2 Next Pointer

Item 3 Data
Item 3 Next Pointer

In Memory – Arbitrary Order

Logical Arrangement

Item 1

Item 2

Item 3

Item 2 Previous PointerItem 1 Previous Pointer Item 3 Previous Pointer

Deciphering Program Data 553

23_574817 appc.qxd 3/16/05 8:45 PM Page 553

Free download pdf