首页
学习
活动
专区
工具
TVP
发布
精选内容/技术社群/优惠产品,尽在小程序
立即前往

认识目标文件的格式——a.out COFF PE ELF

目标文件是源代码编译后未进行链接的中间文件(Windows的.obj和Linux的.o),与可执行文件(Windows的.exe和Linux的ELF)的结构和内容相似,因此跟可执行文件采用同一种格式存储。PC平台常见的可执行文件格式主要有Windows的PE(Portable Executable)和Linux的ELF(Executable and Linkable Format)。PE和ELF都是通用目标文件格式(COFF,Common Object File Format)的变种。在Windows下,我们将目标文件与可执行文件统称为PE-COFF文件,Linux统称为ELF文件。除此之外,还有些不常用的目标文件与可执行文件格式,比如Intel和Microsoft以前使用的对象模型文件(OMF,Object Module File)、Unix的最初使用的a.out和MS-DOS的.COM格式等。

03
  • 您找到你想要的搜索结果了吗?
    是的
    没有找到

    深圳世微补光灯 恒流调光IC调光深度0.1%无频闪

    AP5160 采用峰值电流检测和固定关断时间的控制方式,电路工作在开关管导通和关断 两种状态。 AP5160 典型应用图,当 MOS 开关管处于导通状态时、输入电压通过 LED 灯、电感、MOS 开关管、电流检测电阻 Rcs 对电感充电,流过电感的电流随充电时间逐渐增大,当电流检 测电阻 Rcs 上的电压降达到电流检测阈值电压 VCS_TH 时,控制电路使得 DRV 输出端变为低电 平并关断 MOS 开关管。 当 MOS 开关管处于关断状态时,电感通过由 LED 灯、续流二极管 DFW 以及电感自身组 成的环路对电感储能放电。MOS 开关管在关断一个固定的时间 TOFF 后,重新回到导通状态, 并重复以上导通与关断过程。

    03

    IDA PRO 5.6 Demo

    ‘instant debugger’: the debugger can be launched and a process started without a database. This feature is available locally and remotely and allows the debugger to be attached to any running process in the system. IDA can be used as the default system debugger. Remote 64-bit debugger for MS Windows 64 running on AMD64/EMT64. IDA itself runs in 32-bit mode while the debugger server runs in 64-bit mode to launch and debug 64-bit applications. full type system support for the ARM processor. IDA supports the function calling conventions and comments function parameters in the same way as it does on PC. The ARM module has been significantly improved: see a list of all the ARM specific enhancements below. Wizard-like interface to load new files. IDA assists the user in the initial load process by asking relevant questions about the file. This interface is configurable with XML files. Processor Modules

    04

    Python开发, 恶意病毒扫描

    #!/usr/bin/python ''' Extracts some basic features from PE files. Many of the features implemented have been used in previously published works. For more information, check out the following resources: * Schultz, et al., 2001: http://128.59.14.66/sites/default/files/binaryeval-ieeesp01.pdf * Kolter and Maloof, 2006: http://www.jmlr.org/papers/volume7/kolter06a/kolter06a.pdf * Shafiq et al., 2009: https://www.researchgate.net/profile/Fauzan_Mirza/publication/242084613_A_Framework_for_Efficient_Mining_of_Structural_Information_to_Detect_Zero-Day_Malicious_Portable_Executables/links/0c96052e191668c3d5000000.pdf * Raman, 2012: http://2012.infosecsouthwest.com/files/speaker_materials/ISSW2012_Selecting_Features_to_Classify_Malware.pdf * Saxe and Berlin, 2015: https://arxiv.org/pdf/1508.03096.pdf

    06
    领券