click to view more

Debugging And Reverse Engineering Embedded ARM Executables By Example

by Magda, Yury

$12.04

List Price: $14.90
Save: $2.86 (19%)
add to favourite
  • In Stock - Ship in 24 hours with Free Online tracking.
  • FREE DELIVERY by Tuesday, July 22, 2025
  • 24/24 Online
  • Yes High Speed
  • Yes Protection

Description

This book describes the practical methods of debugging and reverse engineering externally built executables (ELF files) developed for ARM-based embedded systems.
The debugging and reverse engineering techniques are illustrated with the embedded systems equipped with Microchip, Infineon and STM32 Cortex-M microcontrollers, although the techniques described in this guide may be applied for any other ARM-based systems.
Debugging example code was implemented in the Keil uVision 5.34, IAR EW 9.10.1 and STM32CubeIDE 1.7.0. Reverse engineering ELF files was implemented using the GHIDRA Disassembler / Decompiler 10.0.1.

Last updated on

Product Details

  • Aug 4, 2021 Pub Date:
  • 9798549730786 ISBN-10:
  • 9798549730786 ISBN-13:
  • English Language