語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Foundations of ARM64 Linux debugging...
~
Vostokov, Dmitry.
FindBook
Google Book
Amazon
博客來
Foundations of ARM64 Linux debugging, disassembling, and reversing = analyze code, understand stack memory usage, and reconstruct original C/C++ code with ARM64 /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Foundations of ARM64 Linux debugging, disassembling, and reversing/ by Dmitry Vostokov.
其他題名:
analyze code, understand stack memory usage, and reconstruct original C/C++ code with ARM64 /
作者:
Vostokov, Dmitry.
出版者:
Berkeley, CA :Apress : : 2023.,
面頁冊數:
xiv, 170 p. :ill., digital ;24 cm.
內容註:
Chapter 1 - A64.1: Memory, Registers, and Simple Arithmetic -- Chapter 2 - A64.2: Code Optimization -- Chapter 3 - A64.3: Number Representations -- Chapter 4 - A64.4: Pointers -- Chapter 5 - A64.5: Bytes, Half Words, Words, and Double Words -- Chapter 6 - A64.6: Pointers to Memory -- Chapter 7 - A64.7: Logical Instructions and PC -- Chapter 8 - A64.8: Reconstructing a Program with Pointers -- Chapter 9 - A64.9: Memory and Stacks -- Chapter 10 - A64.10: Frame Pointer and Local Variables -- Chapter 11- A64.11: Function Parameters -- Chapter 12 - A64.12: More Instructions -- Chapter 13 - A64.13: Function Pointer Parameters -- Chapter 14 - A64.14: Summary of Code Disassembly Patterns.
Contained By:
Springer Nature eBook
標題:
Operating systems (Computers) -
電子資源:
https://doi.org/10.1007/978-1-4842-9082-8
ISBN:
9781484290828
Foundations of ARM64 Linux debugging, disassembling, and reversing = analyze code, understand stack memory usage, and reconstruct original C/C++ code with ARM64 /
Vostokov, Dmitry.
Foundations of ARM64 Linux debugging, disassembling, and reversing
analyze code, understand stack memory usage, and reconstruct original C/C++ code with ARM64 /[electronic resource] :by Dmitry Vostokov. - Berkeley, CA :Apress :2023. - xiv, 170 p. :ill., digital ;24 cm.
Chapter 1 - A64.1: Memory, Registers, and Simple Arithmetic -- Chapter 2 - A64.2: Code Optimization -- Chapter 3 - A64.3: Number Representations -- Chapter 4 - A64.4: Pointers -- Chapter 5 - A64.5: Bytes, Half Words, Words, and Double Words -- Chapter 6 - A64.6: Pointers to Memory -- Chapter 7 - A64.7: Logical Instructions and PC -- Chapter 8 - A64.8: Reconstructing a Program with Pointers -- Chapter 9 - A64.9: Memory and Stacks -- Chapter 10 - A64.10: Frame Pointer and Local Variables -- Chapter 11- A64.11: Function Parameters -- Chapter 12 - A64.12: More Instructions -- Chapter 13 - A64.13: Function Pointer Parameters -- Chapter 14 - A64.14: Summary of Code Disassembly Patterns.
Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary analysis of compiled C and C++ code. It is ideal for those working with embedded devices, including mobile phones and tablets. Using the latest version of Red Hat, you'll look closely at the foundations of diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems. You'll also work with the GDB debugger and use it for disassembly and reversing. This book uses practical step-by-step exercises of increasing complexity with explanations and many diagrams, including some necessary background topics. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. And as you'll see, memory forensics, malware, and vulnerability analysis, require an understanding of ARM64 assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations you'll need to understand internal Linux program structure and behavior. Foundations of ARM64 Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity. You will: Review the basics of ARM64 assembly language Examine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patterns See how pointers in C and C++ are implemented and used.
ISBN: 9781484290828
Standard No.: 10.1007/978-1-4842-9082-8doiSubjects--Uniform Titles:
Linux.
Subjects--Topical Terms:
539553
Operating systems (Computers)
LC Class. No.: QA76.774.L46 / V67 2023
Dewey Class. No.: 005.432
Foundations of ARM64 Linux debugging, disassembling, and reversing = analyze code, understand stack memory usage, and reconstruct original C/C++ code with ARM64 /
LDR
:03671nmm a2200325 a 4500
001
2316493
003
DE-He213
005
20230130162352.0
006
m d
007
cr nn 008maaau
008
230902s2023 cau s 0 eng d
020
$a
9781484290828
$q
(electronic bk.)
020
$a
9781484290811
$q
(paper)
024
7
$a
10.1007/978-1-4842-9082-8
$2
doi
035
$a
978-1-4842-9082-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.774.L46
$b
V67 2023
072
7
$a
U
$2
bicssc
072
7
$a
COM051390
$2
bisacsh
072
7
$a
ULJ
$2
thema
082
0 4
$a
005.432
$2
23
090
$a
QA76.774.L46
$b
V971 2023
100
1
$a
Vostokov, Dmitry.
$3
3629772
245
1 0
$a
Foundations of ARM64 Linux debugging, disassembling, and reversing
$h
[electronic resource] :
$b
analyze code, understand stack memory usage, and reconstruct original C/C++ code with ARM64 /
$c
by Dmitry Vostokov.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2023.
300
$a
xiv, 170 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1 - A64.1: Memory, Registers, and Simple Arithmetic -- Chapter 2 - A64.2: Code Optimization -- Chapter 3 - A64.3: Number Representations -- Chapter 4 - A64.4: Pointers -- Chapter 5 - A64.5: Bytes, Half Words, Words, and Double Words -- Chapter 6 - A64.6: Pointers to Memory -- Chapter 7 - A64.7: Logical Instructions and PC -- Chapter 8 - A64.8: Reconstructing a Program with Pointers -- Chapter 9 - A64.9: Memory and Stacks -- Chapter 10 - A64.10: Frame Pointer and Local Variables -- Chapter 11- A64.11: Function Parameters -- Chapter 12 - A64.12: More Instructions -- Chapter 13 - A64.13: Function Pointer Parameters -- Chapter 14 - A64.14: Summary of Code Disassembly Patterns.
520
$a
Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary analysis of compiled C and C++ code. It is ideal for those working with embedded devices, including mobile phones and tablets. Using the latest version of Red Hat, you'll look closely at the foundations of diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems. You'll also work with the GDB debugger and use it for disassembly and reversing. This book uses practical step-by-step exercises of increasing complexity with explanations and many diagrams, including some necessary background topics. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. And as you'll see, memory forensics, malware, and vulnerability analysis, require an understanding of ARM64 assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations you'll need to understand internal Linux program structure and behavior. Foundations of ARM64 Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity. You will: Review the basics of ARM64 assembly language Examine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patterns See how pointers in C and C++ are implemented and used.
630
0 0
$a
Linux.
$3
539555
650
0
$a
Operating systems (Computers)
$3
539553
650
0
$a
Open source software.
$3
581998
650
0
$a
Debugging in computer science.
$3
590474
650
1 4
$a
Open Source.
$3
2210577
650
2 4
$a
Operating Systems.
$3
892491
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-9082-8
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9452743
電子資源
11.線上閱覽_V
電子書
EB QA76.774.L46 V67 2023
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入