Debugging And Reverse Engineering Embedded ARM Executables By Example, ISBN: 9798549730786
Debugging And Reverse Engineering Embedded ARM Executables By Example
  • By (author) Magda Yury

Available for Order

HKD $144.00

within 14 to 24 business days
Brief Description

This book describes the practical methods of debugging and reverse engineering externally built executables (ELF files) developed for ARM-based embedded systems.
The debugging and reverse engineering techniques are illustrated with the embedded systems equipped with Microchip, Infineon and STM32 Cortex-M microcontrollers, although the techniques described in this guide may be applied for any other ARM-based systems.
Debugging example code was implemented in the Keil uVision 5.34, IAR EW 9.10.1 and STM32CubeIDE 1.7.0. Reverse engineering ELF files was implemented using the GHIDRA Disassembler / Decompiler 10.0.1.


Book Details
Publisher:
Independently Published
Binding:
Paperback
Date of Pub.:
Aug 4, 2021
Edition:
edition
Language:
-
ISBN:
9798549730786
Dimensions:
-
Weights:
163.29g
Contact Us
Contact Person
Ms. Annie Chau
Email Address
annie.chau@apbookshop.com
Fax No.
+852 2391-7430
Office Hours
Mon to Fri: 9am to 6pm
Sat, Sun and Public Holidays: Closed
General Enquiry
Debugging And Reverse Engineering Embedded ARM Executables By Example, ISBN: 9798549730786  
This site use cookies. By continuing to browse this site you are agreeing to our use of cookies.