Blue Fox: Arm Assembly Internals and Reverse Engineering (藍狐:ARM組合語言內部原理與逆向工程)
Markstedter, Maria
- 出版商: Wiley
- 出版日期: 2023-04-11
- 定價: $1,700
- 售價: 9.0 折 $1,530
- 語言: 英文
- 頁數: 480
- 裝訂: Quality Paper - also called trade paper
- ISBN: 1119745306
- ISBN-13: 9781119745303
-
相關分類:
ARM、Assembly
-
相關翻譯:
ARM 彙編與逆向工程藍狐捲基礎知識 (簡中版)
立即出貨
買這商品的人也買了...
-
$2,010$1,910 -
$1,820Assembly Language Step-by-Step: Programming with Linux, 3/e (Paperback)
-
$1,068$1,015 -
$1,330Assembly Language for x86 Processors, 7/e (IE-Paperback)
-
$280$238 -
$1,750$1,663 -
$1,700$1,615 -
$648$616 -
$2,180$2,071 -
$1,500$1,425 -
$600$468 -
$1,850$1,758 -
$560$280 -
$890$703 -
$600$468 -
$520$260 -
$704嵌入式實時操作系統 — 基於 ARM Mbed OS 的應用實踐
-
$410$369 -
$454PID 控制系統設計 — 使用 MATLAB 和 Simulink 模擬與分析
-
$607操作系統:原理與實現
-
$1,920$1,824 -
$1,980$1,881 -
$650$429 -
$774$735 -
$2,860$2,717
相關主題
商品描述
Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing billions of Arm devices
Finding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier--Arm processors are already in use by more than 90% of all mobile devices, billions of Internet of Things (IoT) devices, and a growing number of current laptops from companies including Microsoft, Lenovo, and Apple. Written by a leading expert on Arm security, Blue Fox: Arm Assembly Internals and Reverse Engineering introduces readers to modern Armv8-A instruction sets and the process of reverse-engineering Arm binaries for security research and defensive purposes.
Divided into two sections, the book first provides an overview of the ELF file format and OS internals, followed by Arm architecture fundamentals, and a deep-dive into the A32 and A64 instruction sets. Section Two delves into the process of reverse-engineering itself: setting up an Arm environment, an introduction to static and dynamic analysis tools, and the process of extracting and emulating firmware for analysis. The last chapter provides the reader a glimpse into macOS malware analysis of binaries compiled for the Arm-based M1 SoC. Throughout the book, the reader is given an extensive understanding of Arm instructions and control-flow patterns essential for reverse engineering software compiled for the Arm architecture. Providing an in-depth introduction into reverse-engineering for engineers and security researchers alike, this book:
- Offers an introduction to the Arm architecture, covering both AArch32 and AArch64 instruction set states, as well as ELF file format internals
- Presents in-depth information on Arm assembly internals for reverse engineers analyzing malware and auditing software for security vulnerabilities, as well as for developers seeking detailed knowledge of the Arm assembly language
- Covers the A32/T32 and A64 instruction sets supported by the Armv8-A architecture with a detailed overview of the most common instructions and control flow patterns
- Introduces known reverse engineering tools used for static and dynamic binary analysis
- Describes the process of disassembling and debugging Arm binaries on Linux, and using common disassembly and debugging tools
Blue Fox: Arm Assembly Internals and Reverse Engineering is a vital resource for security researchers and reverse engineers who analyze software applications for Arm-based devices at the assembly level.
商品描述(中文翻譯)
提供讀者在分析和保護數十億個Arm設備時,建立Arm組合語言內部和逆向工程基礎的堅實基礎。
在Arm設備中尋找和緩解安全漏洞是下一個關鍵的互聯網安全前沿- Arm處理器已經被超過90%的所有移動設備使用,數十億個物聯網(IoT)設備以及包括Microsoft,Lenovo和Apple在內的越來越多的筆記型電腦。由Arm安全領域的領先專家撰寫,《Blue Fox:Arm組合語言內部和逆向工程》介紹了現代Armv8-A指令集和逆向工程Arm二進制文件進行安全研究和防禦目的的過程。
本書分為兩部分,首先概述了ELF文件格式和操作系統內部,然後介紹了Arm架構基礎知識,並深入研究了A32和A64指令集。第二部分深入探討了逆向工程的過程:建立Arm環境,介紹靜態和動態分析工具,以及提取和模擬固件進行分析的過程。最後一章為讀者提供了一個瞥見,即針對基於Arm的M1 SoC編譯的二進制文件進行macOS惡意軟件分析。在整本書中,讀者將深入了解Arm指令和控制流模式,這對於逆向工程針對Arm架構編譯的軟件至關重要。本書為工程師和安全研究人員提供了深入介紹逆向工程的資源,具體內容如下:
- 提供了Arm架構的介紹,包括AArch32和AArch64指令集狀態,以及ELF文件格式內部
- 為逆向工程師提供了有關Arm組合語言內部的深入信息,以分析惡意軟件和審計軟件的安全漏洞,同時也為開發人員提供了Arm組合語言的詳細知識
- 詳細介紹了Armv8-A架構支持的A32/T32和A64指令集,並概述了最常見的指令和控制流模式
- 介紹了用於靜態和動態二進制分析的已知逆向工程工具
- 描述了在Linux上反彙編和調試Arm二進制文件的過程,以及常用的反彙編和調試工具
《Blue Fox:Arm組合語言內部和逆向工程》是安全研究人員和逆向工程師在組合語言級別上分析基於Arm設備的軟件應用程序的重要資源。
作者簡介
MARIA MARKSTEDTER is the CEO and founder of Azeria Labs, offering high-quality training courses on Arm reverse engineering and exploitation. She has an extensive educational background, holding a Bachelor's degree in Corporate Security and a Master's degree in Enterprise Security, and has collaborated with Arm on exploit mitigation research. Maria's outstanding contributions to the cybersecurity industry have earned her a place on Forbes' "30 under 30" list for technology in Europe (2018) and the title of Forbes Person of the Year in Cybersecurity in 2020.
作者簡介(中文翻譯)
MARIA MARKSTEDTER 是 Azeria Labs 的首席執行官和創始人,該公司提供高品質的 Arm 反向工程和利用培訓課程。她擁有豐富的教育背景,擁有企業安全學士學位和企業安全碩士學位,並與 Arm 合作進行利用緩解研究。Maria 在網絡安全行業的傑出貢獻使她入選福布斯 2018 年歐洲科技界「30位30歲以下」名單,並於 2020 年獲得福布斯年度網絡安全人物稱號。