Premium
Exploiting machine‐specific pointer operations in abstract machines
Author(s) -
Fraser Christopher W.,
Hanson David R.
Publication year - 1982
Publication title -
software: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.437
H-Index - 70
eISSN - 1097-024X
pISSN - 0038-0644
DOI - 10.1002/spe.4380120408
Subject(s) - computer science , software portability , exploit , abstract machine , pointer (user interface) , call stack , universal turing machine , stack (abstract data type) , programming language , artificial intelligence , turing machine , computer security , computation
Increasingly powerful machine instructions complicate abstract machine design for portability. Abstract machine instructions must be “larger” than the target machine instructions that they are to exploit, but they must not grow so large as to complicate the realization of the abstract machine on real machines. This paper presents related techniques for low‐level yet machine‐independent access to typical stack and string‐processing instructions.