|
|
|
|
LEADER |
00000nam a2200000 a 4500 |
003 |
AR-LpUFIB |
005 |
20250423183239.0 |
008 |
230201s2019 xxu r 000 0 eng d |
020 |
|
|
|a 9781593279127
|
024 |
8 |
|
|a DIF-M8103
|b 8327
|z DIF007408
|
040 |
|
|
|a AR-LpUFIB
|b spa
|c AR-LpUFIB
|
100 |
1 |
|
|a Andriesse, Dennis
|9 49934
|
245 |
1 |
0 |
|a Practical binary analysis :
|b build your own Linux tools for binary instrumentation, analysis, and disassembly
|
260 |
|
|
|a San Francisco :
|b No Starch Press,
|c 2019
|
300 |
|
|
|a xvi, 431 p.
|
500 |
|
|
|a Incluye índice.
|
505 |
0 |
|
|a Introduction -- Part I. Binary Formats -- 1. Anatomy of a Binary -- 2. The ELF Format -- 3. The PE Format: A Brief Introduction -- 4. Building a Binary Loader Using libbfd -- Part II. Binary Analysis Fundamentals -- 5. Basic Binary Analysis In Linux -- 6. Disassembly and Binary Analysis Fundamentals -- 7. Simple Code Injection Techniques for ELF -- Part III. Advanced Binary Analysis -- 8. Customizing Disassembly -- 9. Binary Instrumentation -- 10. Principles of Dynamic Taint Analysis -- 11. Practical Dynamic Taint Analysis with libdft -- 12. Principles of Symbolic Execution -- 13. Practical Symbolic Execution with Triton -- Part IV. Appendices -- Appendix A: A Crash Course on x86 Assembly -- Appendix B: Implementing PT_NOTE Overwriting Using libelf -- Appendix C: List of Binary Analysis Tools -- Appendix D: Further Reading
|
650 |
|
4 |
|a SEGURIDAD INFORMÁTICA
|9 42779
|
650 |
|
4 |
|a LINUX
|9 42725
|
650 |
|
4 |
|a SOFTWARE MALICIOSO
|9 45803
|
653 |
|
|
|a análisis binario
|
942 |
|
|
|c BK
|
952 |
|
|
|0 0
|1 0
|4 0
|6 K65_AND
|7 0
|9 82784
|a DIF
|b DIF
|d 2025-03-11
|i DIF-04838
|l 0
|o K.6.5 AND
|p DIF-04838
|r 2025-03-11 17:05:02
|w 2025-03-11
|y BK
|
999 |
|
|
|c 57183
|d 57183
|