Blue Fox: Arm Assembly Internals and Reverse Engineering
暫譯: 藍狐:ARM組合語言內部結構與逆向工程
Markstedter, Maria
- 出版商: Wiley
- 出版日期: 2023-04-11
- 定價: $1,700
- 售價: 9.0 折 $1,530
- 語言: 英文
- 頁數: 480
- 裝訂: Quality Paper - also called trade paper
- ISBN: 1119745306
- ISBN-13: 9781119745303
-
相關分類:
ARM、Assembly
-
相關翻譯:
ARM 彙編與逆向工程藍狐捲基礎知識 (簡中版)
立即出貨
買這商品的人也買了...
-
$2,030$1,929 -
$1,330Assembly Language for x86 Processors, 7/e (IE-Paperback)
-
$750$713 -
$320$272 -
$1,750$1,663 -
$1,700$1,615 -
$2,180$2,071 -
$1,500$1,425 -
$408$388 -
$1,758$1,665 -
$560$280 -
$520$260 -
$410$369 -
$534$507 -
$714$678 -
$1,920$1,824 -
$2,040$1,938 -
$650$429 -
$673深入淺出 SSD:固態存儲核心技術、原理與實戰, 2/e
-
$2,850$2,708 -
$680$537 -
$780$616 -
$468$445 -
$680$537 -
$720$562
相關主題
商品描述
Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing billions of Arm devices
Finding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier--Arm processors are already in use by more than 90% of all mobile devices, billions of Internet of Things (IoT) devices, and a growing number of current laptops from companies including Microsoft, Lenovo, and Apple. Written by a leading expert on Arm security, Blue Fox: Arm Assembly Internals and Reverse Engineering introduces readers to modern Armv8-A instruction sets and the process of reverse-engineering Arm binaries for security research and defensive purposes.
Divided into two sections, the book first provides an overview of the ELF file format and OS internals, followed by Arm architecture fundamentals, and a deep-dive into the A32 and A64 instruction sets. Section Two delves into the process of reverse-engineering itself: setting up an Arm environment, an introduction to static and dynamic analysis tools, and the process of extracting and emulating firmware for analysis. The last chapter provides the reader a glimpse into macOS malware analysis of binaries compiled for the Arm-based M1 SoC. Throughout the book, the reader is given an extensive understanding of Arm instructions and control-flow patterns essential for reverse engineering software compiled for the Arm architecture. Providing an in-depth introduction into reverse-engineering for engineers and security researchers alike, this book:
- Offers an introduction to the Arm architecture, covering both AArch32 and AArch64 instruction set states, as well as ELF file format internals
- Presents in-depth information on Arm assembly internals for reverse engineers analyzing malware and auditing software for security vulnerabilities, as well as for developers seeking detailed knowledge of the Arm assembly language
- Covers the A32/T32 and A64 instruction sets supported by the Armv8-A architecture with a detailed overview of the most common instructions and control flow patterns
- Introduces known reverse engineering tools used for static and dynamic binary analysis
- Describes the process of disassembling and debugging Arm binaries on Linux, and using common disassembly and debugging tools
Blue Fox: Arm Assembly Internals and Reverse Engineering is a vital resource for security researchers and reverse engineers who analyze software applications for Arm-based devices at the assembly level.
商品描述(中文翻譯)
提供讀者在 Arm 組合語言內部結構和逆向工程基礎方面的堅實基礎,以便分析和保護數十億個 Arm 設備。
在 Arm 設備中尋找和減輕安全漏洞是下一個關鍵的網際網路安全前沿——Arm 處理器已經被超過 90% 的所有行動裝置、數十億個物聯網 (IoT) 設備以及越來越多的當前筆記型電腦(包括 Microsoft、Lenovo 和 Apple 等公司)所使用。由 Arm 安全領域的專家撰寫的《Blue Fox: Arm 組合語言內部結構與逆向工程》向讀者介紹了現代 Armv8-A 指令集以及為安全研究和防禦目的進行 Arm 二進位檔逆向工程的過程。
本書分為兩個部分,首先提供 ELF 檔案格式和作業系統內部結構的概述,接著介紹 Arm 架構基礎,並深入探討 A32 和 A64 指令集。第二部分深入探討逆向工程的過程:設置 Arm 環境、靜態和動態分析工具的介紹,以及提取和模擬韌體以進行分析的過程。最後一章讓讀者一窺針對 Arm 基礎的 M1 SoC 編譯的二進位檔進行 macOS 惡意軟體分析的情況。在整本書中,讀者將對 Arm 指令和控制流模式有深入的理解,這對於逆向工程針對 Arm 架構編譯的軟體至關重要。本書為工程師和安全研究人員提供了逆向工程的深入介紹,具體內容包括:
- 介紹 Arm 架構,涵蓋 AArch32 和 AArch64 指令集狀態,以及 ELF 檔案格式的內部結構
- 提供有關 Arm 組合語言內部結構的深入資訊,供逆向工程師分析惡意軟體和審核安全漏洞的軟體,以及尋求 Arm 組合語言詳細知識的開發人員
- 涵蓋 Armv8-A 架構所支持的 A32/T32 和 A64 指令集,並詳細概述最常見的指令和控制流模式
- 介紹用於靜態和動態二進位檔分析的已知逆向工程工具
- 描述在 Linux 上反組譯和調試 Arm 二進位檔的過程,以及使用常見的反組譯和調試工具
《Blue Fox: Arm 組合語言內部結構與逆向工程》是安全研究人員和逆向工程師在組合語言層面分析 Arm 基礎設備的軟體應用的重要資源。
作者簡介
MARIA MARKSTEDTER is the CEO and founder of Azeria Labs, offering high-quality training courses on Arm reverse engineering and exploitation. She has an extensive educational background, holding a Bachelor's degree in Corporate Security and a Master's degree in Enterprise Security, and has collaborated with Arm on exploit mitigation research. Maria's outstanding contributions to the cybersecurity industry have earned her a place on Forbes' "30 under 30" list for technology in Europe (2018) and the title of Forbes Person of the Year in Cybersecurity in 2020.
作者簡介(中文翻譯)
MARIA MARKSTEDTER 是 Azeria Labs 的執行長及創辦人,該公司提供高品質的 Arm 逆向工程與利用的訓練課程。她擁有豐富的教育背景,持有企業安全的學士學位及企業安全的碩士學位,並曾與 Arm 合作進行利用緩解研究。Maria 在網路安全產業的卓越貢獻使她入選《福布斯》2018 年歐洲科技領域的「30 位 30 歲以下」名單,並於 2020 年獲得《福布斯》網路安全年度人物的稱號。