Debugging And Reverse Engineering Embedded ARM Executables By Example by Yury Magda (Paperback, 2021)

Rarewaves Outlet (1419912)
98.2% positive Feedback
Price:
£13.60
Free postage
Estimated delivery Mon, 4 Aug - Wed, 6 Aug
Returns:
30 days return. Buyer pays for return postage. If you use an eBay delivery label, it will be deducted from your refund amount.
Condition:
New
Author: Yury Magda. Title: Debugging And Reverse Engineering Embedded ARM Executables By Example. Type: Electronics & Communications Engineering. Genre: Technology & Engineering. Format: Paperback. Topic: Computing & Internet.

About this product

Product Information

This book describes the practical methods of debugging and reverse engineering externally built executables (ELF files) developed for ARM-based embedded systems. The debugging and reverse engineering techniques are illustrated with the embedded systems equipped with Microchip, Infineon and STM32 Cortex-M microcontrollers, although the techniques described in this guide may be applied for any other ARM-based systems. Debugging example code was implemented in the Keil uVision 5.34, IAR EW 9.10.1 and STM32CubeIDE 1.7.0. Reverse engineering ELF files was implemented using the GHIDRA Disassembler / Decompiler 10.0.1.

Product Identifiers

PublisherIndependently Published
ISBN-139798549730786
eBay Product ID (ePID)14049900130

Product Key Features

Number of Pages116 Pages
LanguageEnglish
Publication NameDebugging and Reverse Engineering Embedded Arm Executables by Example
Publication Year2021
SubjectComputer Science
TypeTextbook
AuthorYury Magda
Subject AreaMaterial Science
FormatPaperback

Dimensions

Item Height229 mm
Item Weight163 g
Item Width152 mm

Additional Product Features

Title_AuthorYury Magda

All listings for this product

Buy it now
New
No ratings or reviews yet
Be the first to write a review