Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 2 of 2
Full-Text Articles in Computer Engineering
Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer
Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer
Browse all Theses and Dissertations
Vulnerabilities in source code can be compiled for multiple processor architectures and make their way into several different devices. Security researchers frequently have no way to obtain this source code to analyze for vulnerabilities. Therefore, the ability to effectively analyze binary code is essential. Similarity detection is one facet of binary code analysis. Because source code can be compiled for different architectures, the need can arise for detecting code similarity across architectures. This need is especially apparent when analyzing firmware from embedded computing environments such as Internet of Things devices, where the processor architecture is dependent on the product and …
Design Of Cpu Simulation Software For Armv7 Instruction Set Architecture, Dillon Tellier
Design Of Cpu Simulation Software For Armv7 Instruction Set Architecture, Dillon Tellier
Computer Engineering
Simulations have long been a part of the engineering process in both the professional and academic domain. From a pedagogic standpoint, simulations allow students to explore the dynamics of engineering scenarios by controlling variables, taking measurements, and observing behavior which would be difficult or impossible without simulation. One such tool is a CPU simulator used in Cal Poly’s Computer Architecture classes; this software simulates an instruction accurate operation of a computer processor and reports statistics regarding the execution of the supplied compiled machine code. For the last several years Cal Poly’s computer architecture classes have used a previous version of …