You are here

Back to top

Debugging And Reverse Engineering Embedded ARM Executables By Example (Paperback)

Debugging And Reverse Engineering Embedded ARM Executables By Example Cover Image
Email or call for price

Description


This book describes the practical methods of debugging and reverse engineering externally built executables (ELF files) developed for ARM-based embedded systems.
The debugging and reverse engineering techniques are illustrated with the embedded systems equipped with Microchip, Infineon and STM32 Cortex-M microcontrollers, although the techniques described in this guide may be applied for any other ARM-based systems.
Debugging example code was implemented in the Keil uVision 5.34, IAR EW 9.10.1 and STM32CubeIDE 1.7.0. Reverse engineering ELF files was implemented using the GHIDRA Disassembler / Decompiler 10.0.1.


Product Details
ISBN: 9798549730786
Publisher: Independently Published
Publication Date: August 4th, 2021
Pages: 116
Language: English