Reversing: Secrets of Reverse Engineering

Couverture
John Wiley & Sons, 12 déc. 2011 - 624 pages
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language
 

Table des matières

Foundations
3
Contents
13
LowLevel Software
25
Contents
30
Windows Fundamentals
69
The Kernel Memory Space
75
Processes and Threads
83
Reversing Tools
109
Reversing Malware
273
Cracking
307
Antireversing Techniques
327
Breaking Protections
357
Beyond Disassembly
421
Decompilation
457
Appendix A Deciphering Code Structures
479
Appendix B Understanding Compiled Arithmetic
519

ILDasm
115
Miscellaneous Reversing Tools
133
Applied Reversing
139
Deciphering File Formats
199
Auditing Program Binaries
243
Deciphering Program Data
537
Citations
561
Index
567
Droits d'auteur

Autres éditions - Tout afficher

Expressions et termes fréquents

À propos de l'auteur (2011)

Eldad Eilam is a consultant in the field of reverse engineering. He assists clients with operating system and in-depth software reverse engineering, and has devoted several years to developing advanced reverse engineering techniques.

Informations bibliographiques