000 05590cam a2200565 i 4500
999 _c92754
_d92754
005 20250913090635.0
006 m o d
007 cr cnu---unuuu
008 250913s2024 enkm o u001 0 eng d
020 _a9781394277131
020 _a9781394199907
_qelectronic book
020 _a1394199902
_qelectronic book
020 _a1394199899
_qelectronic book
020 _a9781394199891
_qelectronic book
020 _a9781394277131
_q(electronic bk.)
020 _a139427713X
_q(electronic bk.)
020 _z9781394199884
_qpaperback
024 7 _a10.1002/9781394277131
_2doi
035 _a(OCoLC)1420171149
_z(OCoLC)1420174456
037 _a9781394199884
_bO'Reilly Media
037 _aFCB51403-4CB8-4C79-985C-F5C1A78260E8
_bOverDrive, Inc.
_nhttp://www.overdrive.com
037 _a10649669
_bIEEE
040 _aUKAHL
_beng
_erda
_cUKAHL
_dN$T
_dOCLCO
_dYDX
_dOCLCO
_dORMDA
_dTEFOD
_dIEEEE
_dDG1
041 _aeng
050 4 _aQA76.9.A25
_bD66 2024
082 0 4 _a005.8
_223/eng/20240209
100 1 _aDomas, Stephanie,
_0https://id.loc.gov/authorities/names/no2024029252
_eauthor.
245 1 0 _ax86 software reverse-engineering, cracking, and counter-measures /
_cStephanie Domas, Christopher Domas.
264 1 _aHoboken, New Jersey :
_bJohn Wiley & Sons, Inc.
_c[2024]
300 _a1 online resource :
_billustrations (some color)
336 _atext
_btxt
_2rdacontent.
337 _acomputer
_bc
_2rdamedia.
338 _aonline resource
_bcr
_2rdacarrier.
340 _2rdacc
_0http://rdaregistry.info/termList/RDAColourContent/1003.
490 1 _aTech today.
504 _aIncludes index.
505 0 _aIntroduction xxiii -- Chapter 1 Decompilation and Architecture 1 -- Chapter 2 x86 Assembly: Data, Modes, Registers, and Memory Access 13 -- Chapter 3 x86 Assembly: Instructions 31 -- Chapter 4 Building and Running Assembly Programs 43 -- Chapter 5 Understanding Condition Codes 57 -- Chapter 6 Analyzing and Debugging Assembly Code 65 -- Chapter 7 Functions and Control Flow 77 -- Chapter 8 Compilers and Optimizers 127 -- Chapter 9 Reverse Engineering: Tools and Strategies 137 -- Chapter 10 Cracking: Tools and Strategies 147 -- Chapter 11 Patching and Advanced Tooling 179 -- Chapter 12 Defense 203 -- Chapter 13 Advanced Defensive Techniques 217 -- Chapter 14 Detection and Prevention 229 -- Chapter 15 Legal 239 -- Chapter 16 Advanced Techniques 245 -- Chapter 17 Bonus Topics 251 -- Conclusion 271 -- Index 273.
520 _a"A crystal-clear and practical blueprint to software disassembly. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to reverse-engineer and circumvent software protections. No knowledge of assembly, reverse engineering, or software cracking is required. The book begins with a bootcamp on x86, learning how to read, write, and build in the assembly that powers a massive amount of the world's computers. Then the book will shift to reverse engineering applications using a handful of industry favorites such as IDA, Ghidra, Olly, and more. Next, we move to cracking with techniques such as patching and key generation, all harnessing the power of assembly and reverse engineering. Lastly, we'll examine cracking from a defensive perspective. Providing learners with techniques to be a better defender of their own software, or knowledge to crack these techniques more effectively. A practical and hands-on resource for security professionals to hobbyists, this book is for anyone who wants to learn to take apart, understand, and modify black-box software. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is a vital resource for security researchers, reverse engineers and defenders who analyze, research, crack or defend software applications." --
_cProvided by publisher.
545 0 _aAbout the Author STEPHANIE DOMAS is the CISO of Canonical, where she is driving Canonical to be the most trusted computational partner in all of open source. Prior to that she was the Chief Security Technology Strategist at Intel where she owned the cross-Intel security technology strategy across Intel's wide portfolio of products. Stephanie is a passionate educator, strategist, speaker, advisor, and security enthusiast. CHRISTOPHER DOMAS is a security researcher primarily focused on firmware, hardware, and low level processor exploitation. He is best known for releasing impractical solutions to non-existent problems, including the world's first single instruction C compiler (M/o/Vfuscator), toolchains for generating images in program control flow graphs (REpsych), and Turing-machines in the vi text editor.
650 0 _aComputer security.
_0https://id.loc.gov/authorities/subjects/sh90001862.
650 0 _aX86 assembly language (Computer program language)
_0https://id.loc.gov/authorities/subjects/sh2012003657.
650 0 _aReverse engineering.
_0https://id.loc.gov/authorities/subjects/sh93004214.
650 0 _aHacking.
_0https://id.loc.gov/authorities/subjects/sh2013002597.
650 0 _aSoftware architecture.
_0https://id.loc.gov/authorities/subjects/sh2004001071.
655 4 _aElectronic books.
700 1 _aDomas, Christopher,
_0https://id.loc.gov/authorities/names/no2024029250
_eauthor.
830 0 _aTech today.
856 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131#aboutBook-pane
_yFull text is available at Wiley Online Library Click here to view
942 _2ddc
_cER