- Master key aspects of Armv8A, including register, exception handling, and TrustZone
- Build new reversing skills for kernel binaries, such as *.ko and vmlinux, for firmware analysis
- Understand Armv8A's latest security features
- Purchase of the print or Kindle book includes a free PDF eBook
- Understand the organization of Arm assembly instructions
- Disassemble assembly code without using C code
- Work with reverse engineering tools, such as GDB and binary utility
- Apply reversing techniques for both user space and kernel binaries
- Get to grips with static and dynamic binary analysis processes
- Get a solid understanding of the powerful debugging tool, uftrace
- Analyze TrustZone and the advanced security features provided by Armv8A
This book is for professionals and enthusiasts interested in reverse engineering and debugging on Armv8Abased devices. It is especially useful for system software engineers, security consultants, and ethical hackers expanding their binary analysis expertise. To get the most out of this book, you should have a basic understanding of the C programming language. Familiarity with computer architecture, Linux systems, and security concepts will be a definite advantage.
- Master key aspects of Armv8A, including register, exception handling, and TrustZone
- Build new reversing skills for kernel binaries, such as *.ko and vmlinux, for firmware analysis
- Understand Armv8A's latest security features
- Purchase of the print or Kindle book includes a free PDF eBook
- Understand the organization of Arm assembly instructions
- Disassemble assembly code without using C code
- Work with reverse engineering tools, such as GDB and binary utility
- Apply reversing techniques for both user space and kernel binaries
- Get to grips with static and dynamic binary analysis processes
- Get a solid understanding of the powerful debugging tool, uftrace
- Analyze TrustZone and the advanced security features provided by Armv8A
This book is for professionals and enthusiasts interested in reverse engineering and debugging on Armv8Abased devices. It is especially useful for system software engineers, security consultants, and ethical hackers expanding their binary analysis expertise. To get the most out of this book, you should have a basic understanding of the C programming language. Familiarity with computer architecture, Linux systems, and security concepts will be a definite advantage.
Reverse Engineering Armv8-A Systems: A practical guide to kernel, firmware, and TrustZone analysis
446
Reverse Engineering Armv8-A Systems: A practical guide to kernel, firmware, and TrustZone analysis
446Product Details
| ISBN-13: | 9781835088920 |
|---|---|
| Publisher: | Packt Publishing |
| Publication date: | 08/14/2025 |
| Pages: | 446 |
| Product dimensions: | 7.50(w) x 9.25(h) x 0.90(d) |