x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation /
نام نخستين پديدآور
Bruce Dang, Alexandre Gazet, Elias Bachaalany with contributions from Sébastien Josse
مشخصات ظاهری
نام خاص و کميت اثر
xxvi, 355 pages :
ساير جزييات
illustrations ;
ابعاد
24 cm
یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references and index
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
This book provides a systematic approach to reverse engineering. Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM (Advanced RISC Machine) is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three. Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step. The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenarios and Hands-on exercises
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer security
موضوع مستند نشده
Disassemblers (Computer programs)
موضوع مستند نشده
Reverse engineering-- Data processing
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )