Debugging And Reverse Engineering Embedded ARM Executables By Example Contributor(s): Magda, Yury (Author) |
|
ISBN: ISBN-13: 9798549730786 Publisher: Independently Published OUR PRICE: $14.16 Product Type: Paperback Published: August 2021 |
Additional Information |
BISAC Categories: - Computers | Microprocessors |
Physical Information: 0.24" H x 6" W x 9" (0.36 lbs) 116 pages |
Descriptions, Reviews, Etc. |
Publisher Description: This book describes the practical methods of debugging and reverse engineering externally built executables (ELF files) developed for ARM-based embedded systems. The debugging and reverse engineering techniques are illustrated with the embedded systems equipped with Microchip, Infineon and STM32 Cortex-M microcontrollers, although the techniques described in this guide may be applied for any other ARM-based systems. Debugging example code was implemented in the Keil uVision 5.34, IAR EW 9.10.1 and STM32CubeIDE 1.7.0. Reverse engineering ELF files was implemented using the GHIDRA Disassembler / Decompiler 10.0.1. |