Product Information
This book describes the practical methods of debugging and reverse engineering externally built executables (ELF files) developed for ARM-based embedded systems. The debugging and reverse engineering techniques are illustrated with the embedded systems equipped with Microchip, Infineon and STM32 Cortex-M microcontrollers, although the techniques described in this guide may be applied for any other ARM-based systems. Debugging example code was implemented in the Keil uVision 5.34, IAR EW 9.10.1 and STM32CubeIDE 1.7.0. Reverse engineering ELF files was implemented using the GHIDRA Disassembler / Decompiler 10.0.1.Product Identifiers
PublisherIndependently Published
ISBN-139798549730786
eBay Product ID (ePID)14049900130
Product Key Features
Number of Pages116 Pages
LanguageEnglish
Publication NameDebugging and Reverse Engineering Embedded Arm Executables by Example
Publication Year2021
SubjectComputer Science
TypeTextbook
AuthorYury Magda
Subject AreaMaterial Science
Dimensions
Item Height229 mm
Item Weight163 g
Additional Product Features