XED2 (x86 encoder decoder) c++ library
Hi All,
I just want to use XED2 library made by Intel for assembly encoding. According to the documentation the asm syntax differs from MASM so I have to convert all my original assemblies to XED2 assembly. The question is how? :) I've read all docus and found out the basic differences but call and jump instructions are pretty special. Is there MASM -> XED conversion howto somewhere? For instance how can I convert the following to XED syntax: 1. call far 0x11223344 2. call near 0x11223344 3. call dword ptr [0x11223344] 4. jmp far 0x11223344 5. jmp near 0x11223344 6. jmp dword ptr [0x11223344] Thanks in advance! BR, Ferrit |
Quote:
if it's just up to changing 0x to ...h so regular expressions will help you here?.. |
Maybe I was not explicit enough :)
This works: MASM: xor eax, eax XED2: xor eax eax Quote:
MASM: jmp far 0x11223344 XED2: jmp_far 0x11223344 XED2: jmp_far 11223344h Quote:
|
Quote:
example 012345678h |
Just a slight educated guess. I've read a little (scrambled) through some PDF's from various Universities mentioning xed2 keyword and found that this was made by Intel. Available at http://www.pinpoint.org
You may search there for "XED2" keyword and see if the Downloads and Discussions/Documentation help you. Seems they provide for a flavor of Operating Systems like Window$ and Linux. And here is some more research from University Code:
http://www.cs.virginia.edu/kim/publicity/pin/docs/20751/Xed/html/main.html |
Hi, the documentation at cs.virginia.edu seems outdated, take look at the documentation in the folder pin-2.13-62141-msvc10-windows\extras\xed2-ia32\doc\ref-manual\html\group__CMDLINE.html or at this site
Code:
http://software.intel.com/sites/landingpage/pintool/docs/58423/Xed/html/group__CMDLINE.html Code:
xed -e jmp "BRDISP:11223344" Code:
g:\projects\pin-2.13-62141-msvc10-windows\extras\xed2-ia32\bin>xed -e jmp "BRDISP:11223344" for pointers: Code:
xed -e jmp "MEM4:EAX" Code:
g:\projects\pin-2.13-62141-msvc10-windows\extras\xed2-ia32\bin>xed -e jmp "MEM4: |
I can't edit the post above (don't know why), here is a jmp dword ptr [0x11223344]
Code:
xed -e jmp "MEM4:-,-,-,11223344" Code:
g:\projects\pin-2.13-62141-msvc10-windows\extras\xed2-ia32\bin>xed -e jmp "MEM4:-,-,-,11223344" |
Hey h8er! You're the maaan :)
|
All times are GMT +8. The time now is 12:14. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX