x86 Software Reverse-Engineering, Cracking, and Counter-Measures
Found a better price? Request a price match
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
A crystal-clear and practical blueprint to software disassembly
x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centred around the world of disassembling software. It will start with the basics of the x86 assembly language and progress to how that knowledge empowers you to reverse-engineer and circumvent software protections. No knowledge of assembly, reverse engineering, or software cracking is required.
The book begins with a bootcamp on x86, learning how to read, write, and build in the assembly that powers a massive amount of the worldβs computers. Then the book will shift to reverse engineering applications using a handful of industry favourites such as IDA, Ghidra, Olly, and more. Next, we move to cracking with techniques such as patching and key generation, all harnessing the power of assembly and reverse engineering. Lastly, weβll examine cracking from a defensive perspective, providing learners with techniques to be a better defender of their own software, or knowledge to crack these techniques more effectively.
- Assembly: computer Architecture, x86, system calls, building and linking, ASCII, condition codes, GDB, control flow, stack, calling conventions
- Reverse Engineering: reconnaissance, strings, RE strategy, stripping, linking, optimisations, compilers, industry tools
- Cracking: patching, key checkers, key generators, resource hacking, dependency walking
- Defense: anti-debugging, anti-tamper, packing, cryptors/decryptors, whitelist, blacklist, RASP, code signing, obfuscation
A practical and hands-on resource for security professionals to hobbyists, this book is for anyone who wants to learn to take apart, understand, and modify black-box software. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is a vital resource for security researchers, reverse engineers, and defenders who analyse, research, crack, or defend software applications.
Series: Tech Today
View allBook Details
INFORMATION
ISBN: 9781394199884
Publisher: John Wiley & Sons Inc
Format: Hardback
Date Published: 30 January 2024
Country: United States
Imprint: John Wiley & Sons Inc
Audience: Professional and scholarly
DIMENSIONS
Spine width: 25.0mm
Width: 193.0mm
Height: 234.0mm
Weight: 590g
Pages: 320
About the Author
STEPHANIE DOMAS is the CISO of Canonical, where she is driving Canonical to be the most trusted computational partner in all of open source. Prior to that she was the Chief Security Technology Strategist at Intel where she owned the cross-Intel security technology strategy across Intel's wide portfolio of products. Stephanie is a passionate educator, strategist, speaker, advisor, and security enthusiast.
CHRISTOPHER DOMAS is a security researcher primarily focused on firmware, hardware, and low level processor exploitation. He is best known for releasing impractical solutions to non-existent problems, including the world's first single instruction C compiler (M/o/Vfuscator), toolchains for generating images in program control flow graphs (REpsych), and Turing-machines in the vi text editor.
More from Computing & Technology
View allWhy buy from us?
Book Hero is not a chain store or big box retailer. We're an independent 100% NZ-owned business on a mission to help more Kiwis rediscover a love of books and reading!
Service & Delivery
Our warehouse in Auckland holds over 80,000 books and puzzles in-stock so you're not waiting for your order to arrive from overseas.
Auckland Bookstore
We're primarily an online store, but for your convenience you can pick up your order for free from our bookstore, which is right next door to our warehouse in Hobsonville.
Our Gifting Service
Books make wonderful thoughtful gifts and we're here to help with gift-wrapping and cards. We can even send your gift directly to your loved one.
