Blue Fox
-5%

Blue Fox

Arm Assembly Internals and Reverse Engineering

Markstedter, Maria / Escritor

64,06 €
60,86 €
IVA incluido
Editorial:
John Wiley
Año de edición:
2023
Materia
Informática
ISBN:
978-1-119-74530-3
Páginas:
480
Idioma:
Inglés
Encuadernación:
Rústica
Alto:
2350mm
Ancho:
187mm
64,06 €
60,86 €
IVA incluido
Añadir a favoritos

Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing billions of Arm devices Finding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier-Arm processors are already in use by more than 90% of all mobile devices, billions of Internet of Things (IoT) devices, and a growing number of current laptops from companies including Microsoft, Lenovo, and Apple. Written by a leading expert on Arm security, Blue Fox: Arm Assembly Internals and Reverse Engineering introduces readers to modern Armv8-A instruction sets and the process of reverse-engineering Arm binaries for security research and defensive purposes. Divided into two sections, the book first provides an overview of the ELF file format and OS internals, followed by Arm architecture fundamentals, and a deep-dive into the A32 and A64 instruction sets.

Section Two delves into the process of reverse-engineering itself: setting up an Arm environment, an introduction to static and dynamic analysis tools, and the process of extracting and emulating firmware for analysis. The last chapter provides the reader a glimpse into macOS malware analysis of binaries compiled for the Arm-based M1 SoC. Throughout the book, the reader is given an extensive understanding of Arm instructions and control-flow patterns essential for reverse engineering software compiled for the Arm architecture.

Providing an in-depth introduction into reverse-engineering for engineers and security researchers alike, this book: Offers an introduction to the Arm architecture, covering both AArch32 and AArch64 instruction set states, as well as ELF file format internalsPresents in-depth information on Arm assembly internals for reverse engineers analyzing malware and auditing software for security vulnerabilities, as well as for developers seeking detailed knowledge of the Arm assembly languageCovers the A32/T32 and A64 instruction sets supported by the Armv8-A architecture with a detailed overview of the most common instructions and control flow patternsIntroduces known reverse engineering tools used for static and dynamic binary analysis Describes the process of disassembling and debugging Arm binaries on Linux, and using common disassembly and debugging tools Blue Fox: Arm Assembly Internals and Reverse Engineering is a vital resource for security researchers and reverse engineers who analyze software applications for Arm-based devices at the assembly level.

Artículos relacionados

  • Web3. Creando la próxima frontera económica y cultural de Internet
    Tapscott, Alex / Escritor
    En las tres últimas décadas hemos pasado de la "web de solo lectura" a la "web de lectura escritura", que ha convertido a los usuarios de Internet en creadores de contenido y ofrece infinitas oportunidades para la colaboración. Si bien esta nueva web revolucionó los medios de comunicación, el comercio y otras industrias, la proliferación de ciberataques, ataques de datos y la r...
    En stock

    29,95 €28,45 €

  • YouTube. La fórmula mágica
    Derral, Eva / Escritor
    A medida que YouTube se expande a pasos agigantados, la competencia entre creadores poralcanzar más popularidad y cifras altísimas de suscriptores es cada día mayor. Una viejacámara de iPhone y una estrategia de crecimiento no son suficientes para hacer crecer tucanal y mejorar tus ingresos. En 'YouTube. La fórmula mágica', el experto creador y coach deYouTube Derral Eves te mu...
    En stock

    25,95 €24,65 €

  • Ciberseguridad paso a paso
    ¿Sabías que el 60 % de las empresas que son atacadas cierra su negocio a los 6 meses? Enla nueva era digital, es vital elaborar una adecuada estrategia de ciberseguridad que nospermita protegernos de las amenazas de ciberseguridad y de los nuevos actores de amenazasdel ciberespacio. El cibercrimen tiene un coste de trillones de euros superando al PIB demuchos países. ¿Soy un ob...
    En stock

    36,50 €34,68 €

  • Automating Data Quality Monitoring at Scale
    Stanley, Jeremy / Escritor Schwartz, Paige / Escritor
    The world's businesses ingest a combined 2.5 quintillion bytes of data every day. But how much of this vast amount of data--used to build products, power AI systems, and drive business decisions--is poor quality or just plain bad? This practical book shows you how to ensure that the data your organization relies on contains only high-quality records. Most data engineers, data a...
    Consulte disponibilidad

    99,89 €94,90 €

  • Practical Guide to Applied Conformal Prediction in Python
    Manokhin, Valery / Escritor
    n the rapidly evolving landscape of machine learning, the ability to accurately quantify uncertainty is pivotal. The book addresses this need by offering an in-depth exploration of Conformal Prediction, a cutting-edge framework to manage uncertainty in various ML applications.Learn how Conformal Prediction excels in calibrating classification models, produces well-calibrated pr...
    Consulte disponibilidad

    83,19 €79,03 €

  • Deep Learning : Foundations and Concepts
    Bishop, Christopher M. / Escritor Bishop, Hugh / Escritor
    This book offers a comprehensive introduction to the central ideas that underpin deep learning. It is intended both for newcomers to machine learning and for those already experienced in the field. Covering key concepts relating to contemporary architectures and techniques, this essential book equips readers with a robust foundation for potential future specialization.The field...
    Consulte disponibilidad

    99,48 €94,51 €