opcode


Also found in: Thesaurus, Acronyms, Encyclopedia, Wikipedia.

opcode

(ˈɒpˌkəʊd)
n
(Computer Science) a computer code containing operating instructions
Collins English Dictionary – Complete and Unabridged, 12th Edition 2014 © HarperCollins Publishers 1991, 1994, 1998, 2000, 2003, 2006, 2007, 2009, 2011, 2014
References in periodicals archive ?
In the training process, we use a GPU to train HDN, where opcode encoder can run parallelly to compensate the low efficiency due to the serial computing limitation on LSTM.
Besides these constants, two classifications of predefined constants are also available: operand types and opcode values.
The PowerPC Architecture maintains the same basic programming model and instruction opcode assignments as the POWER architecture.
patterns [ add addcc taddcc wrxxx and andcc tsubcc wrpsr or orcc taddcctv wrwim xor xorcc tsubcctv wrtbr sub subcc mulscc fpop1 andn andncc sll fpop2 orn orncc srl cpop1 xnor xnorcc sra cpop2 addx addxcc rdxxx jmpl _ _ rdpsr rett umul umulcc rdwim ticc smul smulcc rdtbr flush subx subxcc _ save _ _ _ restore udiv udivcc _ _ sdiv sdivcc _ _ ] is TABLE_F3 & op3 = { 0 to 63 columns 4 } The toolkit can handle opcode tables in row-major or column-major form.
(d) The acquired information is integrated into the trace file of program execution, including register information, instruction opcode, instruction operand, and process information.
OpCode If a branch checks an integer for less than zero, less than or equal to zero, or equal to a constant, predict the branch on false condition.
Bilar, "Opcodes as predictor for malware," International Journal of Electronic Security and Digital Forensics, vol.
For each remaining basic block, the instructions are converted to a linked list of intermediate opcodes. At first, each opcode corresponds exactly to a MIPS opcode.
The OP specifies one of the ALU opcodes shown in Figure 4.
Instructions are 2, 4, 6, or 8 bytes long, with their length, address mode, and opcode specified in the first two bytes for efficient decoding.
* Prefix Handling: In some 80x86 instructions, there is a prefix byte, which gives a different meaning when interpreting the opcode. For example, rep prefix means to repeat the subsequent instruction until the ecx register becomes zero.
Drebin[11] uses static analysis to extract as many application features as possible (such as permissions, API calls, network addresses, etc.) to characterize malicious applications; Maldetect[12] extracts Dalvik instructions from dex files and simplify them by symbolizing opcode. Then, N-gram encoding of the instruction sequence is used as the input feature of the classification; DroidSieve [13] extracts massive features centered on resources and semantics, and sorts the features to find the core features; FrequenSel [14]proposes a feature selection algorithm based on the frequency difference between the malicious application and benign application; HinDroid[15] extracts the API to construct a structured heterogeneous information network and characterized the relationship between APIs.