- Mastering Reverse Engineering
- Reginald Wong
- 79字
- 2021-06-10 19:40:23
Memory
When a Windows executable file executes, the system allocates a memory space, reads the executable file from the disk, writes it at predefined sections in the allocated memory, then allows the code to execute from there. This block of memory is called a process block and is linked to other process blocks. Basically, every program that executes consumes a memory space as a process.
The following screenshot shows a Windows Task Manager's view of the list of processes:

推薦閱讀
- Mobile Forensics Cookbook
- CSO進(jìn)階之路:從安全工程師到首席安全官
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實(shí)錄
- 計(jì)算機(jī)使用安全與防護(hù)
- 黑客攻防入門秘笈
- 數(shù)字安全藍(lán)皮書:本質(zhì)屬性與重要特征
- 同態(tài)密碼學(xué)原理及算法
- ARM匯編與逆向工程:藍(lán)狐卷·基礎(chǔ)知識(shí)
- 軟件安全保障體系架構(gòu)
- 人工智能安全(精裝版)
- 網(wǎng)絡(luò)安全態(tài)勢(shì)感知
- 無線傳感器網(wǎng)絡(luò)安全與加權(quán)復(fù)雜網(wǎng)絡(luò)抗毀性建模分析
- 網(wǎng)絡(luò)安全實(shí)戰(zhàn)詳解(企業(yè)專供版)
- 信息系統(tǒng)安全等級(jí)化保護(hù)原理與實(shí)踐
- Manga Studio 5 Beginner's Guide