Debugging And Reverse Engineering Embedded ARM Executables By Example

Author:   Yury Magda
Publisher:   Independently Published
ISBN:  

9798549730786


Pages:   116
Publication Date:   04 August 2021
Format:   Paperback
Availability:   Available To Order   Availability explained
We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately.

Our Price $39.34 Quantity:  
Add to Cart

Share |

Debugging And Reverse Engineering Embedded ARM Executables By Example


Overview

This book describes the practical methods of debugging and reverse engineering externally built executables (ELF files) developed for ARM-based embedded systems. The debugging and reverse engineering techniques are illustrated with the embedded systems equipped with Microchip, Infineon and STM32 Cortex-M microcontrollers, although the techniques described in this guide may be applied for any other ARM-based systems. Debugging example code was implemented in the Keil uVision 5.34, IAR EW 9.10.1 and STM32CubeIDE 1.7.0. Reverse engineering ELF files was implemented using the GHIDRA Disassembler / Decompiler 10.0.1.

Full Product Details

Author:   Yury Magda
Publisher:   Independently Published
Imprint:   Independently Published
Dimensions:   Width: 15.20cm , Height: 0.60cm , Length: 22.90cm
Weight:   0.163kg
ISBN:  

9798549730786


Pages:   116
Publication Date:   04 August 2021
Audience:   General/trade ,  General
Format:   Paperback
Publisher's Status:   Active
Availability:   Available To Order   Availability explained
We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately.

Table of Contents

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List