malware_floating-point
This is an old revision of the document!
Table of Contents
Malware and Floating-Point
This lecture covers two topics: malicious software and the representation / processing of real numbers.
Outline
- Self-modifying code
- Buffer overrun on the stack and its exploitation
- The IEEE 754 standard for representing real numbers in two formats, single (32-bit) and double (64-bit) precision.
- The floating-point instructions.
Big Ideas
- Software vulnerabilities and their exploitation
- The range-precision trade-off in real numbers
- Round-off: an ever present loss of precision in any code that deals with real numbers
To Do
- Go over the files,
SMC1
,SMC2
, andIEEE
in the Resource Directory - Read pages 189-197, 206-207 of Section 3.6. If you have the old version of the textbook then read pages 275-280, 288, and 291 of Section 4.8
malware_floating-point.1192819605.txt.gz · Last modified: 2007/10/19 18:46 (external edit)