Next2Dで始めるゲーム開発 - Game Development Starting with Next2DToshiyuki Ienaga
CEDEC2022に応募したのですが、見事に落選しました。
が、折角作った資料なので公開します。
I applied for CEDEC2022, but was not selected.
However, I am publishing this document because I made it at an opportunity.
Possibility of arbitrary code execution by Step-Oriented Programmingkozossakai
Step-Oriented Programming (SOP) allows executing arbitrary code on embedded systems by repeating step execution and changing the program counter value. A debugger communicates with a target system's stub using the Remote Serial Protocol to read/write memory and registers, enabling full control via simple commands if the connection is compromised. SOP constructs code by combining pieces of existing machine code and executes it without needing to directly inject new code. Therefore attacks are possible even if execution from data areas is prevented. The presentation will demonstrate this attack principle and results from actual experimentation.
Assembly Language Tanka (AVTOKYO2013.5 English version)kozossakai
1) Assembly language tanka is a form of poetry that encodes assembly language programs in a 5-7-5-7-7 syllable structure, similar to Japanese tanka poems.
2) The document discusses which computer architectures are most suitable for writing assembly language tanka based on characteristics like fixed-length instructions and even-numbered machine code.
3) It analyzes examples of tanka written for different architectures like RX, RL78, MN10300, M32C, x86, and concludes that x86 and Linux are very "tankaful" or suitable for writing assembly language tanka.
The document appears to contain hexadecimal code for an executable file. It includes the standard ELF header identifying it as an ELF file, followed by a large block of hexadecimal code making up the body of the executable. Interspersed throughout are strings like "Binary", "Karuta", "Start", "Question", and architecture identifiers like "ARM" and "x86", suggesting it may be executable code for a quiz or game containing binary and arithmetic questions.
The document appears to contain hexadecimal code from an executable file. It includes the standard ELF header markings at the beginning, followed by what seems to be machine code instructions and data. The repeated lines of "Binary Karuta!" and other phrases between sections may indicate different parts of the program or metadata.