Boxing Day Sale is live! Up to 20% off 2000+ Books

Blue Fox

Arm Assembly Internals and Reverse Engineering
4.53 goodreads logo

Ratings/reviews counts are updated frequently.

Check link for latest rating.
( 30 ratings, 4 reviews)
Book Hero Magic crafted this summary to help describe this book. While it's new and still learning, it may not be perfect - your feedback is welcome! Summary
In Blue Fox by Maria Markstedter, readers dive into a deep exploration of cybersecurity concepts and practices, with a focus on modern challenges in technology. The narrative is structured to make complex topics accessible and engaging, offering insights into cutting-edge techniques and strategies employed in the field. It's an essential read for both enthusiasts and professionals seeking a comprehensive understanding of contemporary cybersecurity.
Read More
Format: Paperback / softback
$8599
AVAILABLE WITH SUPPLIER Ships from our Auckland warehouse within 3-4 weeks

Found a better price? Request a price match

Book Hero Magic created this recommendation. While it's new and still learning, it may not be perfect - your feedback is welcome! IS THIS YOUR NEXT READ?

You might enjoy this book if you are intrigued by the world of computing and technology, particularly with a focus on cybersecurity. It's an insightful resource for anyone eager to deepen their understanding of securing software and the intricacies of modern computing threats.

Book Hero thinking about your next read

Blue Fox

Book Hero Magic formatted this description to make it easier to read. While it's new and still learning, it may not be perfect - your feedback is welcome! Description

Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analysing and securing billions of Arm devices.

Finding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier—Arm processors are already in use by more than 90% of all mobile devices, billions of Internet of Things (IoT) devices, and a growing number of current laptops from companies including Microsoft, Lenovo, and Apple. Written by a leading expert on Arm security, Blue Fox: Arm Assembly Internals and Reverse Engineering introduces readers to modern Armv8-A instruction sets and the process of reverse-engineering Arm binaries for security research and defensive purposes.

Divided into two sections, the book first provides an overview of the ELF file format and OS internals, followed by Arm architecture fundamentals, and a deep dive into the A32 and A64 instruction sets. Section Two delves into the process of reverse-engineering itself: setting up an Arm environment, an introduction to static and dynamic analysis tools, and the process of extracting and emulating firmware for analysis. The last chapter provides the reader a glimpse into macOS malware analysis of binaries compiled for the Arm-based M1 SoC. Throughout the book, the reader is given an extensive understanding of Arm instructions and control-flow patterns essential for reverse engineering software compiled for the Arm architecture.

Providing an in-depth introduction into reverse-engineering for engineers and security researchers alike, this book:

  • Offers an introduction to the Arm architecture, covering both AArch32 and AArch64 instruction set states, as well as ELF file format internals.
  • Presents in-depth information on Arm assembly internals for reverse engineers analysing malware and auditing software for security vulnerabilities, as well as for developers seeking detailed knowledge of the Arm assembly language.
  • Covers the A32/T32 and A64 instruction sets supported by the Armv8-A architecture with a detailed overview of the most common instructions and control flow patterns.
  • Introduces known reverse engineering tools used for static and dynamic binary analysis.
  • Describes the process of disassembling and debugging Arm binaries on Linux, and using common disassembly and debugging tools.

Blue Fox: Arm Assembly Internals and Reverse Engineering is a vital resource for security researchers and reverse engineers who analyse software applications for Arm-based devices at the assembly level.

Book Details

INFORMATION

ISBN: 9781119745303

Publisher: John Wiley & Sons Inc

Format: Paperback / softback

Date Published: 25 April 2023

Country: United States

Imprint: John Wiley & Sons Inc

Audience: Professional and scholarly

DIMENSIONS

Spine width: 28.0mm

Width: 185.0mm

Height: 234.0mm

Weight: 658g

Pages: 480

About the Author

MARIA MARKSTEDTER is the CEO and founder of Azeria Labs, offering high-quality training courses on Arm reverse engineering and exploitation. She has an extensive educational background, holding a Bachelor’s degree in Corporate Security and a Master’s degree in Enterprise Security, and has collaborated with Arm on exploit mitigation research. Maria’s outstanding contributions to the cybersecurity industry have earned her a place on Forbes’ “30 under 30” list for technology in Europe (2018) and the title of Forbes Person of the Year in Cybersecurity in 2020.

More from Computing & Technology

View all

Why buy from us?

Book Hero is not a chain store or big box retailer. We're an independent 100% NZ-owned business on a mission to help more Kiwis rediscover a love of books and reading!

Service & Delivery

Service & Delivery

Our warehouse in Auckland holds over 80,000 books and puzzles in-stock so you're not waiting for your order to arrive from overseas.

Auckland Bookstore

Auckland Bookstore

We're primarily an online store, but for your convenience you can pick up your order for free from our bookstore, which is right next door to our warehouse in Hobsonville.

Our Gifting Service

Our Gifting Service

Books make wonderful thoughtful gifts and we're here to help with gift-wrapping and cards. We can even send your gift directly to your loved one.