Foundations of ARM64 Linux debugging, disassembling, and reversing analyze code, understand stack memory usage, and reconstruct original C/C++ code with ARM64

Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary...

Full description

Bibliographic Details
Main Author: Vostokov, Dmitry
Format: eBook
Language:English
Published: New York, NY Apress 2023
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 03716nmm a2200457 u 4500
001 EB002151493
003 EBX01000000000000001289619
005 00000000000000.0
007 cr|||||||||||||||||||||
008 230302 ||| eng
020 |a 9781484290828 
050 4 |a QA76.774.L46 
100 1 |a Vostokov, Dmitry 
245 0 0 |a Foundations of ARM64 Linux debugging, disassembling, and reversing  |b analyze code, understand stack memory usage, and reconstruct original C/C++ code with ARM64  |c Dmitry Vostokov 
260 |a New York, NY  |b Apress  |c 2023 
300 |a xiv, 170 pages  |b illustrations 
505 0 |a Chapter 1 - A64.1: Memory, Registers, and Simple Arithmetic -- Chapter 2 - A64.2: Code Optimization -- Chapter 3 - A64.3: Number Representations -- Chapter 4 - A64.4: Pointers -- Chapter 5 - A64.5: Bytes, Half Words, Words, and Double Words -- Chapter 6 - A64.6: Pointers to Memory -- Chapter 7 - A64.7: Logical Instructions and PC -- Chapter 8 - A64.8: Reconstructing a Program with Pointers -- Chapter 9 - A64.9: Memory and Stacks -- Chapter 10 - A64.10: Frame Pointer and Local Variables -- Chapter 11- A64.11: Function Parameters -- Chapter 12 - A64.12: More Instructions -- Chapter 13 - A64.13: Function Pointer Parameters -- Chapter 14 - A64.14: Summary of Code Disassembly Patterns 
653 |a Open source software / http://id.loc.gov/authorities/subjects/sh99003437 
653 |a Operating systems (Computers) / http://id.loc.gov/authorities/subjects/sh85094982 
653 |a Linux / http://id.loc.gov/authorities/names/n94087892 
653 |a Open source software / fast 
653 |a Linux / fast 
653 |a Operating systems (Computers) / fast 
653 |a Debugging in computer science / fast 
653 |a Systèmes d'exploitation (Ordinateurs) 
653 |a Debugging in computer science / http://id.loc.gov/authorities/subjects/sh85036145 
653 |a operating systems / aat 
653 |a Débogage 
653 |a Logiciels libres 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Includes index 
028 5 0 |a 10.1007/978-1-4842-9082-8 
776 |z 9781484290811 
776 |z 9781484290828 
776 |z 1484290828 
776 |z 148429081X 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484290828/?ar  |x Verlag  |3 Volltext 
082 0 |a 500 
082 0 |a 005.4/32 
520 |a Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary analysis of compiled C and C++ code. It is ideal for those working with embedded devices, including mobile phones and tablets. Using the latest version of Red Hat, you'll look closely at the foundations of diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems. You'll also work with the GDB debugger and use it for disassembly and reversing. This book uses practical step-by-step exercises of increasing complexity with explanations and many diagrams, including some necessary background topics. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. And as you'll see, memory forensics, malware, and vulnerability analysis, require an understanding of ARM64 assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations you'll need to understand internal Linux program structure and behavior