Delivery included to the United States

Debugging And Reverse Engineering Embedded ARM Executables By Example

Debugging And Reverse Engineering Embedded ARM Executables By Example

Paperback (04 Aug 2021)

  • $17.31
Add to basket

Includes delivery to the United States

10+ copies available online - Usually dispatched within 7 days

Publisher's Synopsis

This book describes the practical methods of debugging and reverse engineering externally built executables (ELF files) developed for ARM-based embedded systems.
The debugging and reverse engineering techniques are illustrated with the embedded systems equipped with Microchip, Infineon and STM32 Cortex-M microcontrollers, although the techniques described in this guide may be applied for any other ARM-based systems.
Debugging example code was implemented in the Keil uVision 5.34, IAR EW 9.10.1 and STM32CubeIDE 1.7.0. Reverse engineering ELF files was implemented using the GHIDRA Disassembler / Decompiler 10.0.1.

Book information

ISBN: 9798549730786
Publisher: Amazon Digital Services LLC - KDP Print US
Imprint: Independently Published
Pub date:
Language: English
Number of pages: 116
Weight: 163g
Height: 229mm
Width: 152mm
Spine width: 6mm