{
"item_title" : "Debugging And Reverse Engineering Embedded ARM Executables By Example",
"item_author" : [" Yury Magda "],
"item_description" : "This book describes the practical methods of debugging and reverse engineering externally built executables (ELF files) developed for ARM-based embedded systems.The debugging and reverse engineering techniques are illustrated with the embedded systems equipped with Microchip, Infineon and STM32 Cortex-M microcontrollers, although the techniques described in this guide may be applied for any other ARM-based systems.Debugging example code was implemented in the Keil uVision 5.34, IAR EW 9.10.1 and STM32CubeIDE 1.7.0. Reverse engineering ELF files was implemented using the GHIDRA Disassembler / Decompiler 10.0.1.",
"item_img_path" : "https://covers3.booksamillion.com/covers/bam/9/79/854/973/9798549730786_b.jpg",
"price_data" : {
"retail_price" : "14.90", "online_price" : "14.90", "our_price" : "14.90", "club_price" : "14.90", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : ""
}
}
Overview
This book describes the practical methods of debugging and reverse engineering externally built executables (ELF files) developed for ARM-based embedded systems.
The debugging and reverse engineering techniques are illustrated with the embedded systems equipped with Microchip, Infineon and STM32 Cortex-M microcontrollers, although the techniques described in this guide may be applied for any other ARM-based systems.
Debugging example code was implemented in the Keil uVision 5.34, IAR EW 9.10.1 and STM32CubeIDE 1.7.0. Reverse engineering ELF files was implemented using the GHIDRA Disassembler / Decompiler 10.0.1.
This item is Non-Returnable
Customers Also Bought
Details
- ISBN-13: 9798549730786
- ISBN-10: 9798549730786
- Publisher: Independently Published
- Publish Date: August 2021
- Dimensions: 9 x 6 x 0.24 inches
- Shipping Weight: 0.36 pounds
- Page Count: 116
Related Categories
