04371nam 22005295 450 991064739500332120230726135221.01-4842-9082-810.1007/978-1-4842-9082-8(MiAaPQ)EBC7190067(Au-PeEL)EBL7190067(CKB)26089717300041(OCoLC)1367961268(OCoLC-P)1367961268(DE-He213)978-1-4842-9082-8(CaSebORM)9781484290828(PPN)267812701(EXLCZ)992608971730004120230130d2023 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierFoundations of ARM64 Linux Debugging, Disassembling, and Reversing Analyze Code, Understand Stack Memory Usage, and Reconstruct Original C/C++ Code with ARM64 /by Dmitry Vostokov1st ed. 2023.Berkeley, CA :Apress :Imprint: Apress,2023.1 online resource (180 pages)Includes index.Print version: Vostokov, Dmitry Foundations of ARM64 Linux Debugging, Disassembling, and Reversing Berkeley, CA : Apress L. P.,c2023 9781484290811 Chapter 1 - A64.1: Memory, Registers, and Simple Arithmetic -- Chapter 2 - A64.2: Code Optimization -- Chapter 3 - A64.3: Number Representations -- Chapter 4 - A64.4: Pointers -- Chapter 5 - A64.5: Bytes, Half Words, Words, and Double Words -- Chapter 6 - A64.6: Pointers to Memory -- Chapter 7 - A64.7: Logical Instructions and PC -- Chapter 8 - A64.8: Reconstructing a Program with Pointers -- Chapter 9 - A64.9: Memory and Stacks -- Chapter 10 - A64.10: Frame Pointer and Local Variables -- Chapter 11- A64.11: Function Parameters -- Chapter 12 - A64.12: More Instructions -- Chapter 13 - A64.13: Function Pointer Parameters -- Chapter 14 - A64.14: Summary of Code Disassembly Patterns.Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary analysis of compiled C and C++ code. It is ideal for those working with embedded devices, including mobile phones and tablets. Using the latest version of Red Hat, you'll look closely at the foundations of diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems. You'll also work with the GDB debugger and use it for disassembly and reversing. This book uses practical step-by-step exercises of increasing complexity with explanations and many diagrams, including some necessary background topics. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. And as you'll see, memory forensics, malware, and vulnerability analysis, require an understanding of ARM64 assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations you’ll need to understand internal Linux program structure and behavior. Foundations of ARM64 Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity. You will: Review the basics of ARM64 assembly language Examine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patterns See how pointers in C and C++ are implemented and used.Operating systems (Computers)Open source softwareDebugging in computer scienceOperating systems (Computers)Open source software.Debugging in computer science.005.432Vostokov Dmitry1276990MiAaPQMiAaPQMiAaPQBOOK9910647395003321Foundations of ARM64 Linux Debugging, Disassembling, and Reversing3010143UNINA