Debugging And Reverse Engineering Embedded ARM Executables By Example
Af
- Format
- Bog, hæftet
- Engelsk
- 116 sider
Normalpris
kr. 149,95
Medlemspris
kr. 134,95
- Du sparer kr. 15,00
- Fri fragt
-
Leveringstid: 7-9 Hverdage (Sendes fra fjernlager) Forventet levering: 02-03-2026
- Kan pakkes ind og sendes som gave
Beskrivelse
This book describes the practical methods of debugging and reverse engineering externally built executables (ELF files) developed for ARM-based embedded systems.
The debugging and reverse engineering techniques are illustrated with the embedded systems equipped with Microchip, Infineon and STM32 Cortex-M microcontrollers, although the techniques described in this guide may be applied for any other ARM-based systems.
Debugging example code was implemented in the Keil uVision 5.34, IAR EW 9.10.1 and STM32CubeIDE 1.7.0. Reverse engineering ELF files was implemented using the GHIDRA Disassembler / Decompiler 10.0.1.
Detaljer
- SprogEngelsk
- Sidetal116
- Udgivelsesdato04-08-2021
- ISBN139798549730786
- Forlag Independently Published
- MålgruppeFrom age 0
- FormatHæftet
Størrelse og vægt
Anmeldelser
Vær den første!
Log ind for at skrive en anmeldelse.