10.08.2015 Views

EXPLOITING EMBEDDED SYSTEMS THE SEQUEL!

Exploitation - CanSecWest

Exploitation - CanSecWest

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The MIPS32 Architecture• RISC architecture• Load/store architecture• 32 bit instruction length• 32 general purpose registers• 5 Stage pipeline (4k family)• Support for Enhanced JTAG (EJTAG)Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!