Narrow your search
Listing 1 - 10 of 87 << page
of 9
>>
Sort by

Book
Eighth Working Conference on Reverse Engineering : proceedings, 2-5 October, 2001, Stuttgart, Germany
Authors: --- --- --- ---
Year: 2001 Publisher: [Place of publication not identified] IEEE Computer Society

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Reverse engineering
Author:
ISBN: 1281359076 6000022727 8189940163 Year: 2007 Publisher: Chandni Chowk, Delhi : Global Media,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation
Authors: --- --- ---
ISBN: 9781118787397 1118787390 9781118787250 1118787250 Year: 2014 Publisher: Indianapolis, IN : John Wiley and Sons,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hacke


Book
Reversible computing : fundamentals, quantum computing, and applications
Author:
ISBN: 9783527409921 3527409920 Year: 2010 Publisher: Weinheim: Wiley-VCH,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Blue Fox : arm assembly internals and reverse engineering
Author:
ISBN: 9781119746737 1119746736 Year: 2023 Publisher: Hoboken, New Jersey : John Wiley & Sons, Inc.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Finding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier—Arm processors are already in use by more than 90% of all mobile devices, billions of Internet of Things (IoT) devices, and a growing number of current laptops from companies including Microsoft, Lenovo, and Apple. Written by a leading expert on Arm security, Blue Fox: Arm Assembly Internals and Reverse Engineering introduces readers to modern Armv8-A instruction sets and the process of reverse-engineering Arm binaries for security research and defensive purposes.


Book
Ninth Working Conference on Reverse Engineering : proceedings : 29 October-1 November, 2002, Richmond, Virginia

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Reverse Engineering, 1993 Working Conference On
Author:
Year: 1993 Publisher: [Place of publication not identified] IEEE Computer Society Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Working Conference, held in Baltimore, May 1993, was created as a research-oriented forum on the theory and technology of recovering information from existing software and systems. The contributed papers address topics in issues and approaches, identifying components, tools, program understanding, challenges, database, user interfaces, dealing with legacy systems, dynamic analysis and testing, and transformation. No index. Acidic paper. Annotation copyright by Book News, Inc., Portland, OR.


Book
Sixth Working Conference on Reverse Engineering : proceedings : October 6-8, 1999, Atlanta, Georgia, USA

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Proceedings of 2nd Working Conference on Reverse Engineering
Authors: --- ---
Year: 1995 Publisher: Los Alamitos, California : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Proceedings of 2nd Working Conference on Reverse Engineering
Authors: --- ---
Year: 1995 Publisher: Los Alamitos, California : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 87 << page
of 9
>>
Sort by