Publisher's Synopsis
This book is thought as a highly practical guide to reverse engineering embedded ARM binaries. There may be various reasons why we need to reverse a binary running on some embedded system. In practice, reversing ARM binaries may be necessary when we want to adjust some existing embedded system to new or updated conditions, but we don't have a source code to completely rebuild an embedded application. This guide illustrates various approaches that can be applied while reversing ARM binaries. The reverse engineering techniques are illustrated in the demo examples based upon the real-life designs using the STM32F7 and ATSAMD21 microcontrollers. Analyzing binaries is implemented using GHIDRA 9.2.2 that is a freely available open source SRE tool suite from the National Security Agency (NSA).