MOVSDMove String Data
MOVSDMove String Doubleword
Copyright 1988-2018, All rights reserved.
References in periodicals archive ?
The stack buffer overflow vulnerabilities model of this paper mainly concerns whether the operand of instruction rep movsd can override function return address or EBP to further affect the control flow of program.
The value of I is 1 if and only if instruction rep movsd exists in the trace of program execution.
At this time, becuase the value of ECX is too large, the function return address 0x12FE30 is covered by taint data when the rep movsd is executed.
The cause of program crash is that the value of ECX is too large, resulting in stack overflows when the instruction rep movsd is executed.