Foundations of ARM64 Linux Debugging, Disassembling, and Reversing : Analyze Code, Understand Stack Memory Usage, and Reconstruct Original C/C++ Code with ARM64 (1st)

個数:

Foundations of ARM64 Linux Debugging, Disassembling, and Reversing : Analyze Code, Understand Stack Memory Usage, and Reconstruct Original C/C++ Code with ARM64 (1st)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 170 p.
  • 言語 ENG
  • 商品コード 9781484290811
  • DDC分類 005.432

Full Description

Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary analysis of compiled C and C++ code. It is ideal for those working with embedded devices, including mobile phones and tablets.

Using the latest version of Red Hat, you'll look closely at the foundations of diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems. You'll also work with the GDB debugger and use it for disassembly and reversing. This book uses practical step-by-step exercises of increasing complexity with explanations and many diagrams, including some necessary background topics.  In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code.  

And as you'll see, memory forensics, malware, and vulnerability analysis, require an understanding of ARM64 assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations you'll need to understand internal Linux program structure and behavior.  

Foundations of ARM64 Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity.

 What You'll Learn

Review the basics of ARM64 assembly language
Examine the essential GDB debugger commands for debugging and binary analysis 
Study C and C++ compiler code generation with and without compiler optimizations 

Look at binary code disassembly and reversing patterns

See how pointers in C and C++ are implemented and used

Who This Book Is ForSoftware support and escalation engineers, cloud security engineers, site reliability engineers, DevSecOps, platform engineers, software testers, Linux C/C++ software engineers and security researchers without ARM64 assembly language background, and beginners learning Linux software reverse engineering techniques.

Contents

Chapter 1 - A64.1: Memory, Registers, and Simple Arithmetic.- Chapter 2 - A64.2: Code Optimization.- Chapter 3 - A64.3: Number Representations.- Chapter 4 - A64.4: Pointers.-Chapter 5 - A64.5: Bytes, Half Words, Words, and Double Words.- Chapter 6 - A64.6: Pointers to Memory.- Chapter 7 - A64.7: Logical Instructions and PC.- Chapter 8 - A64.8: Reconstructing a Program with Pointers.- Chapter 9 - A64.9: Memory and Stacks.- Chapter 10 - A64.10: Frame Pointer and Local Variables.- Chapter 11- A64.11: Function Parameters.- Chapter 12 - A64.12: More Instructions.- Chapter 13 - A64.13: Function Pointer Parameters.- Chapter 14 - A64.14: Summary of Code Disassembly Patterns.

最近チェックした商品