Blue Fox

book title

Blue Fox



Maria Markstedter
Published Date : 2022-12-08
Amazon

Description

Provides readers with a solid foundation in Arm assembly internals and using reverse-engineering as the basis for analyzing and securing billions of Arm devices Finding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier—Arm processors are already in use by more than 90% of all mobile devices, billions of Internet of Things (IoT) devices, and a growing number of current and soon-to-arrive laptops from companies including Microsoft, Lenovo, and Apple. Written by a leading expert on Arm security, Blue Fox: Arm Assembly Internals and Binary Analysis of Mobile and IoT Devices introduces readers to modern Armv8-A instruction sets and the process of reverse-engineering Arm binaries for security research and defensive purposes. Divided into two sections, the book first provides a detailed look at the Armv8-A assembly languages, followed by OS and Arm architecture fundamentals, and a deep-dive into the A32 and A64 instruction sets. Section Two delves into the process of reverse-engineering itself: setting up an Arm environment, an introduction to static and dynamic analysis tools, and the process of extracting and emulating firmware for analysis. Throughout the book, the reader is given an extensive understanding of Arm instructions and control-flow patterns essential for reverse engineering software compiled for the Arm architecture. Providing an in-depth introduction into reverse-engineering for engineers and security researchers alike, this book: Offers an introduction to the Arm architecture, covering both AArch32 and AArch64 instruction set states, as well as ELF file format internals Presents in-depth information on Arm assembly internals for reverse engineers analyzing malware and auditing software for security vulnerabilities, as well as for developers seeking detailed knowledge of the Arm assembly language Covers the A32/T32 and A64 instruction sets supported by the Armv8-A architecture with a detailed overview of the most common instructions and control flow patterns Introduces known reverse engineering tools used for static and dynamic binary analysis Describes the process of disassembling and debugging Arm binaries on Linux, and using disassembly and debugging tools including Ghidra and GDB. Blue Fox: Arm Assembly Internals and Binary Analysis of Mobile and IoT Devices is a vital resource for security researchers and reverse engineers who analyze software applications for IoT and mobile devices at the assembly level.


word

word
Arm
security
assembly
devices
instruction
architecture
IoT
reverse-engineering
reverse
process
detailed
book
Armv-A
tools
A
engineers
internals
introduction
software
sets
analysis
binaries
billions
in-depth
Assembly
Internals
readers
including
engineering
Devices
Binary
dynamic
researchers
static
patterns
Blue
debugging
analyzing
Analysis
instructions
mobile
Fox
vulnerabilities
Mobile
AArch
states
delves
basis
modern
soon-to-arrive
reader
Written
AT
developers
foundation
alike
Introduces
Covers
control-flow
introduces
mitigating
vital
processors
auditing
OS
disassembly
GDB
deep-dive
Things
information
disassembling
Two
Describes
purposes
sections
laptops
expert
research
securing
extracting
overview
Offers
seeking
Lenovo
covering
Apple
growing
Presents
setting
environment
knowledge
fundamentals
Finding
compiled
supported
Throughout
essential
applications
Providing
defensive
analyze
format
number
ELF
resource
emulating
binary
leading
flow
Ghidra
languages
companies
language
level
Internet
9
extensive
solid
Linux
Divided
understanding
critical
control
malware
frontierArm
Section
common
Microsoft
Provides
set
firmware
internet

Leave a Comment