Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
6 result(s) for "Disassemblers (Computer programs)"
Sort by:
Practical binary analysis : build your own Linux tools for binary instrumentation, analysis, and disassembly
\"Begins with an introduction covering the basics of binary formats, disassembly, and code injection, then moves on to more advanced topics such as binary instrumentation, dynamic taint analysis, and symbolic execution\"-- Provided by publisher.
The IDA pro book : the unofficial guide to the world's most popular disassembler
IDA Pro is a commercial disassembler and debugger used by reverse engineers to dissect compiled computer programs, and is the industry standard tool for analysis of hostile code. The IDA Pro Book provides a comprehensive, top-down overview of IDA Pro and its use for reverse engineering software. Author Chris Eagle, a recognized expert in the field, takes readers from the basics of disassembly theory to the complexities of using IDA Pro in real-world situations. Topics are introduced in the order most frequently encountered, allowing experienced users to easily jump in at the most appropriate point. Eagle covers a variety of real-world reverse engineering challenges and offers strategies to deal with them, such as disassembly manipulation, graphing, and effective use of cross references. This second edition of The IDA Pro Book has been completely updated and revised to cover the new features and cross-platform interface of IDA Pro 6.0. Other additions include expanded coverage of the IDA Pro Debugger, IDAPython, and the IDA Pro SDK.
The IDA Pro Book, 2nd Edition
IDA Pro is a commercial disassembler and debugger used by reverse engineers to dissect compiled computer programs, and is the industry standard tool for analysis of hostile code. The IDA Pro Book provides a comprehensive, top-down overview of IDA Pro and its use for reverse engineering software. Author Chris Eagle, a recognized expert in the field, takes readers from the basics of disassembly theory to the complexities of using IDA Pro in real-world situations. Topics are introduced in the order most frequently encountered, allowing experienced users to easily jump in at the most appropriate point. Eagle covers a variety of real-world reverse engineering challenges and offers strategies to deal with them, such as disassembly manipulation, graphing, and effective use of cross references. This second edition of The IDA Pro Book has been completely updated and revised to cover the new features and cross-platform interface of IDA Pro 6.0. Other additions include expanded coverage of the IDA Pro Debugger, IDAPython, and the IDA Pro SDK.
CPU-Doctor: when a device’s heart-beat can be an acoustic side-channel disassembler
In recent years, the ever increasing need of computing has lead to design of modern embedded computing devices that are dedicated to provide enhanced system performance. But, due to inadequate security monitoring and the challenges of ongoing operating systems’ patching, modern embedded computing systems are not supposed to be growing as much as seen in recent years. Specifically, embedded systems are applied in industry and household devices with some hesitation from people, because they are susceptible to malware, software piracy and data exfiltration. Therefore, it is vital to protect embedded devices from malicious activities and safeguard the integrity of executable software. In this paper, we propose (to the best of our knowledge) the first acoustic side-channel-based disassembler to investigate the real-time functioning of embedded systems at the instruction level. More specifically, we highlight the fact that the Central Processing Unit (CPU) (micro-controller in case of edge/embedded devices) can have a heart-beat (sound). This heart-beat extraction and analysis methodology are discussed in detail in this work. To design our proposed disassembler, we initially collect templates from a source device and then apply machine learning algorithms to uniquely identify instructions executed on the device. For this purpose, we use a hierarchical classification framework, to implement an acoustic side-channel disassembler “CPU-Doctor” for ATMEGA328P and ARM Cortex A53. “CPU-Doctor” exactly identifies group of the instructions with 100% ssaccuracy and uniquely determines the instruction with 96.67% accuracy in verification phase. Although we have presented the experimental analysis on ATMEGA328P and ARM Cortex A53, our approach is generic in nature and can be applied to any processor.
Practical reverse engineering
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. * Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples * Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques * Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step * Demystifies topics that have a steep learning curve * Includes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.