Reversing: Secrets of Reverse Engineering

Front Cover
Wiley, Apr 15, 2005 - Computers - 589 pages
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language

From inside the book

What people are saying - Write a review

LibraryThing Review

User Review  - jcopenha - LibraryThing

This is a great book. Plenty of real world examples of reverse engineering. Good real world examples of ASM usage. Lots of interesting techniques described in the anti-reversing section. I even read ... Read full review

User Review - Flag as inappropriate

reverse engg

Contents

Foundations
3
LowLevel Software
25
Windows Fundamentals
69
Copyright

16 other sections not shown

Other editions - View all

Common terms and phrases

References to this book

About the author (2005)

Eldad Eilam is a consultant in the field of reverse engineering. He assists clients with operating system and in-depth software reverse engineering, and has devoted several years to developing advanced reverse engineering techniques.

Bibliographic information