reverse-engineering   1757

« earlier    

[1406.1886v1] The Z1: Architecture and Algorithms of Konrad Zuse's First Computer
This paper provides the first comprehensive description of the Z1, the mechanical computer built by the German inventor Konrad Zuse in Berlin from 1936 to 1938. The paper describes the main structural elements of the machine, the high-level architecture, and the dataflow between components. The computer could perform the four basic arithmetic operations using floating-point numbers. Instructions were read from punched tape. A program consisted of a sequence of arithmetical operations, intermixed with memory store and load instructions, interrupted possibly by input and output operations. Numbers were stored in a mechanical memory. The machine did not include conditional branching in the instruction set. While the architecture of the Z1 is similar to the relay computer Zuse finished in 1941 (the Z3) there are some significant differences. The Z1 implements operations as sequences of microinstructions, as in the Z3, but does not use rotary switches as micro-steppers. The Z1 uses a digital incrementer and a set of conditions which are translated into microinstructions for the exponent and mantissa units, as well as for the memory blocks. Microinstructions select one out of 12 layers in a machine with a 3D mechanical structure of binary mechanical elements. The exception circuits for mantissa zero, necessary for normalized floating-point, were lacking; they were first implemented in the Z3. The information for this article was extracted from careful study of the blueprints drawn by Zuse for the reconstruction of the Z1 for the German Technology Museum in Berlin, from some letters, and from sketches in notebooks. Although the machine has been in exhibition since 1989 (non-operational), no detailed high-level description of the machine's architecture had been available. This paper fills that gap.
computer  history  reverse-engineering  engineering-design  nanohistory  to-write-about 
25 days ago by Vaguery - BinDiff
zynamics BinDiff uses a unique graph-theoretical approach to compare executables
by identifying identical and similar functions
bindiff  foss  hacking  ida  ida-pro  idapro  opensource  reverse-engineering  reverseengineering  reversing  security 
5 weeks ago by GranoblasticMan

« earlier    

related tags

adware  aes  analysis  android  angr  anti-analysis  anti-debug  anti-sandbox  api  apk  app  arcade  architecture  archive  arm  asm  assembers  assembly  ast  automobile  awesome  aws  barcode  binary  bindiff  bitcoin  blackhat  blog  bluetooth  book  books  business  bytecode  c#  c++  c  car  cloudcomputing  community  computer  cool  course  cpu  crack  crackme  cryptanalysis  ctf  curated  debug  debugger  debugging  decompiler  defcon  deobfuscation  dev  development  devops  diagram  disassembler  disassemblers  disassembly  documentation  dotnet  drm  dump  dynamic  edge  education  electronics  elf  emulator  engine  engineering-design  engineering  escape  ethereum  evm  exe  executable  execution  exploit  extension  file  fileformat  files  filetype  fireeye  firmware  flare  forensics  format  foss  framework  game-development  game-genie  gameboy  games  github-watch  google  gremlin  gui  hack  hacking  hardware  heap  hex  history  how-to  hp  ida-pro  ida  idapro  import  inspiration  internet  ios  iphone  jailbreak  jar  java  javascript  julia_evans  kernel  keyboard  library  link-list  linux  loaders  logic-analysers  low-level  machine  macho  malware  maps  memory  mesh-networking  microsoft  mobile  multi-platform  mz  nanohistory  nes  network  networking  nintendo  notability  nrf24  obfuscation  objective-c  ollydbg  online  opencontent  opensource  overflow  packet  paid  pe  piracy  plugin  practice  presentation  printer  process  programming  protocol  puzzle  puzzles  pykd  python  qt  quebec  r2  radare  radare2  rar  rce  reference  research  restaurant  retro  reverse  reverse_engineering  reverseengineering  reversing  rf  rvmi  sandbox  script  sdr  sections  security  side-channel  software  soundcloud  string  strings  symbolic  symbols  synchronize  syscall  tape  tax  team  tips-and-tricks  to-write-about  tool  tools  training  tutorial  twitter  type  type:application  unicorn  unix  usb  video  videogames  virtual  visualization  vm  vmi  walkthrough  web  whatsapp  wifi  windbg  windows  wireless  wireshark  x64  x86-64  x86  x86_64  zelda  zx-spectrum 

Copy this bookmark: