Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
6
result(s) for
"Disassemblers (Computer programs)"
Sort by:
Practical binary analysis : build your own Linux tools for binary instrumentation, analysis, and disassembly
\"Begins with an introduction covering the basics of binary formats, disassembly, and code injection, then moves on to more advanced topics such as binary instrumentation, dynamic taint analysis, and symbolic execution\"-- Provided by publisher.
The IDA pro book : the unofficial guide to the world's most popular disassembler
by
Eagle, Chris
in
Debugging in computer science
,
Disassemblers (Computer programs)
,
IDA Pro (Electronic resource)
2011
IDA Pro is a commercial disassembler and debugger used by reverse engineers to dissect compiled computer programs, and is the industry standard tool for analysis of hostile code. The IDA Pro Book provides a comprehensive, top-down overview of IDA Pro and its use for reverse engineering software. Author Chris Eagle, a recognized expert in the field, takes readers from the basics of disassembly theory to the complexities of using IDA Pro in real-world situations. Topics are introduced in the order most frequently encountered, allowing experienced users to easily jump in at the most appropriate point. Eagle covers a variety of real-world reverse engineering challenges and offers strategies to deal with them, such as disassembly manipulation, graphing, and effective use of cross references. This second edition of The IDA Pro Book has been completely updated and revised to cover the new features and cross-platform interface of IDA Pro 6.0. Other additions include expanded coverage of the IDA Pro Debugger, IDAPython, and the IDA Pro SDK.
The IDA Pro Book, 2nd Edition
by
Eagle, Chris
in
Debugging in computer science
,
Disassemblers (Computer programs)
,
Execution traces (Computer program testing)
2011
IDA Pro is a commercial disassembler and debugger used by reverse engineers to dissect compiled computer programs, and is the industry standard tool for analysis of hostile code. The IDA Pro Book provides a comprehensive, top-down overview of IDA Pro and its use for reverse engineering software. Author Chris Eagle, a recognized expert in the field, takes readers from the basics of disassembly theory to the complexities of using IDA Pro in real-world situations. Topics are introduced in the order most frequently encountered, allowing experienced users to easily jump in at the most appropriate point. Eagle covers a variety of real-world reverse engineering challenges and offers strategies to deal with them, such as disassembly manipulation, graphing, and effective use of cross references. This second edition of The IDA Pro Book has been completely updated and revised to cover the new features and cross-platform interface of IDA Pro 6.0. Other additions include expanded coverage of the IDA Pro Debugger, IDAPython, and the IDA Pro SDK.
CPU-Doctor: when a device’s heart-beat can be an acoustic side-channel disassembler
by
Chatterjee, Urbi
,
Negi, Rohit
,
Mishra, Vishesh
in
Accuracy
,
Acoustics
,
Central processing units
2024
In recent years, the ever increasing need of computing has lead to design of modern embedded computing devices that are dedicated to provide enhanced system performance. But, due to inadequate security monitoring and the challenges of ongoing operating systems’ patching, modern embedded computing systems are not supposed to be growing as much as seen in recent years. Specifically, embedded systems are applied in industry and household devices with some hesitation from people, because they are susceptible to malware, software piracy and data exfiltration. Therefore, it is vital to protect embedded devices from malicious activities and safeguard the integrity of executable software. In this paper, we propose (to the best of our knowledge) the first acoustic side-channel-based disassembler to investigate the real-time functioning of embedded systems at the instruction level. More specifically, we highlight the fact that the Central Processing Unit (CPU) (micro-controller in case of edge/embedded devices) can have a heart-beat (sound). This heart-beat extraction and analysis methodology are discussed in detail in this work. To design our proposed disassembler, we initially collect templates from a source device and then apply machine learning algorithms to uniquely identify instructions executed on the device. For this purpose, we use a hierarchical classification framework, to implement an acoustic side-channel disassembler “CPU-Doctor” for ATMEGA328P and ARM Cortex A53. “CPU-Doctor” exactly identifies group of the instructions with 100% ssaccuracy and uniquely determines the instruction with 96.67% accuracy in verification phase. Although we have presented the experimental analysis on ATMEGA328P and ARM Cortex A53, our approach is generic in nature and can be applied to any processor.
Journal Article
Practical reverse engineering
by
Gazet, Alexandre
,
Dang, Bruce
,
Bachaalany, Elias
in
Computer software
,
Computers
,
Reverse engineering
2014
Analyzing how hacks are done, so as to stop them in the future
Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.
The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples.
* Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples
* Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques
* Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step
* Demystifies topics that have a steep learning curve
* Includes a bonus chapter on reverse engineering tools
Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.