Jian Ma

- A web developer with a passion to make a better world.

September 24, 2019

MIPS Disassembler

User input a 32-bit machine instructions that a compiler or assembler produces. This program will output what the original source instructions were The possible source instructions being able to disassemble such as add, sub, and, or, slt, lw, sw, beq, and bne.

October 30, 2019

Cache Simulation

This is a software simulation of the way that a real cache works, . The “cache" will be a software structure/class that will contain information similar to what would be in a real cache. The size of "main memory" will be a 2K. Support three types of requests: Read byte, Write byte, and Display cache, and show cache miss or hit.

In process

Pipelined Datapath Simulation

A software simulation of how a pipelined datapath works. Having functions for each step in the pipeline including IF, ID, EX, MEM, WB, etc .After each cycle it will print out the Regs values and both the READ and WRITE versions of all four pipeline registers.

April 14, 2019

Campus Network Design for a University

A network design for a geographically distributed organization. There are five primary areas: definition of an organization, its application requirements, its local area network design, its backbone network design, and its security and management considerations.

June 11, 2019

Report on Rootkit Techniques & Detection

This research paper explores rootkits field which has a tight connection with operating system and is an important issue in computer system security. In the beginning, I explains why I would like to look into this field. In the second place, the paper introduces the concept of rootkits and the categories based on the computer security layers. Then I probe the techniques used for rootkits and corresponding detection method including dynamic detection and static detection. Finally, I search papers in last two years to figure out what is the hot issue in academic filed.