Reverse Engineering Per Principianti

Total Page:16

File Type:pdf, Size:1020Kb

Reverse Engineering Per Principianti ____ | _ \ _____ _____ _ __ ___ ___ | |_) / _ \ \ / / _ \ '__/ __|/ _ \ | _ < __/\ V / __/ | \__ \ __/ |_| \_\___| \_/ \___|_| |___/\___| _____ _ _ | ____|_ __ __ _(_)_ __ ___ ___ _ __(_)_ __ __ _ | _| | '_ \ / _` | | '_ \ / _ \/ _ \ '__| | '_ \ / _` | | |___| | | | (_| | | | | | __/ __/ | | | | | | (_| | |_____|_| |_|\__, |_|_| |_|\___|\___|_| |_|_| |_|\__, | |___/ |___/ __ / _| ___ _ __ | |_ / _ \| '__| | _| (_) | | |_| \___/|_| ____ _ | __ ) ___ __ _(_)_ __ _ __ ___ _ __ ___ | _ \ / _ \/ _` | | '_ \| '_ \ / _ \ '__/ __| | |_) | __/ (_| | | | | | | | | __/ | \__ \ |____/ \___|\__, |_|_| |_|_| |_|\___|_| |___/ |___/ i Reverse Engineering per Principianti (Capire il linguaggio Assembly) Perchè due titoli? Leggi qua: on page viii. Dennis Yurichev <[email protected]> cba ©2013-2020, Dennis Yurichev. Questo lavoro è rilasciato sotto licenza Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0). Per vedere la copia di questa licenza visita il sito https://creativecommons.org/licenses/by-sa/4.0/. Teston (6 settembre 2021). L’ultima versione (e l’edizione Russa) del testo sono accessibili al seguente sito: https://beginners.re/. Cerchiamo traduttori! Puoi aiutare a tradurre questo progetto in linguaggi diversi dall’Inglese ed il Russo. Basta inviarmi un qualsiasi pezzo di testo tradotto (non importa quanto è lungo) e lo aggiungerò al mio codice sorgente scritto in LaTeX. Leggi qui. La velocità non è importante, perchè è un progetto Open Source, dopo tutto. Il tuo nome sarà menzionato come Contributore del progetto. Coreano, Cinese e Persiano sono linguaggi reservati ai publisher. Le versioni in Inglese e Russo le traduco da solo, ma il mio Inglese è ancora terribile, quindi vi sono grato ad ogni correzione sulla mia grammatica, ecc... Anche il mio Russo non è ancora perfetto, quindi sono felice di ricevere correzioni anche per il Russo! Non esitate a contattarmi: <[email protected]>. Sommario 1 Pattern di codice 1 2 Italian text placeholder 281 3 285 4 Java 286 5 297 6 Strumenti 301 7 306 8 Libri/blog da leggere 307 9 Community 310 Afterword 312 Appendice 314 Acronimi utilizzati 321 Glossario 324 Indice analitico 326 ii iii Indice 1 Pattern di codice 1 1.1 Il metodo ......................................... 1 1.2 Alcune basi teoriche .................................. 2 1.2.1 Una breve introduzione alla CPU ...................... 2 1.2.2 Qualche parola sulle diverse ISA1 ..................... 3 1.2.3 Sistemi di numerazione ........................... 4 1.2.4 Convertire da una radice ad un’altra ................... 4 1.3 Una funzione vuota .................................. 8 1.3.1 x86 ........................................ 8 1.3.2 ARM ........................................ 8 1.3.3 MIPS ........................................ 8 1.3.4 Le funzioni vuote in pratica ......................... 9 1.4 Ritornare valori ..................................... 10 1.4.1 x86 ........................................ 10 1.4.2 ARM ........................................ 11 1.4.3 MIPS ........................................ 11 1.5 Hello, world! ....................................... 12 1.5.1 x86 ........................................ 12 1.5.2 x86-64 ...................................... 20 1.5.3 ARM ........................................ 24 1.5.4 MIPS ........................................ 33 1.5.5 Conclusione ................................... 39 1.5.6 Esercizi ...................................... 39 1.6 Prologo ed epilogo delle funzioni .......................... 40 1.6.1 Ricorsione .................................... 40 1.7 Una Funzione Vuota: redux ............................. 40 1.8 Valori di Ritorno: redux ................................ 41 1.9 Stack ........................................... 41 1.9.1 Perchè lo stack cresce al contrario? .................... 42 1.9.2 Per cosa viene usato lo stack? ....................... 42 1.9.3 Una tipico layout dello stack ........................ 51 1.9.4 Rumore nello stack .............................. 51 1.9.5 Esercizi ...................................... 56 1.10 Una funzione quasi vuota ............................. 56 1.11 printf() con più argomenti ............................. 57 1.11.1 x86 ....................................... 57 1.11.2 ARM ....................................... 72 1Instruction Set Architecture iv 1.11.3 MIPS ....................................... 80 1.11.4 Conclusione .................................. 88 1.11.5 A proposito .................................. 89 1.12 scanf() .......................................... 89 1.12.1 Un semplice esempio ............................ 89 1.12.2 Il classico errore ...............................101 1.12.3 Varibili globali .................................102 1.12.4 scanf() .....................................114 1.12.5 Esercizio ....................................127 1.13 Degno di nota: variabili globali vs locali . 128 1.14 Accesso agli argomenti ...............................128 1.14.1 x86 .......................................128 1.14.2 x64 .......................................131 1.14.3 ARM .......................................135 1.14.4 MIPS .......................................139 1.15 Ulteriori considerazioni sulla restituzione dei risultati . 141 1.15.1 Tentativo di utilizzare il risultato di una funzione che resituisce void ........................................141 1.15.2 Che succede se il risultato della funzione non viene usato? . 143 1.15.3 Restituire una struttura . 143 1.16 Puntatori ........................................145 1.16.1 Ritornare valori ................................145 1.16.2 Valori di input in Swap . 155 1.17 L’operatore GOTO ..................................156 1.17.1 Dead code ...................................159 1.17.2 Esercizio ....................................160 1.18 Jump condizionali ...................................160 1.18.1 Esempio semplice ..............................160 1.18.2 Calcolo del valore assoluto . 181 1.18.3 Operatore ternario ..............................184 1.18.4 Ottenere i valori massimo e minimo . 188 1.18.5 Conclusione ..................................194 1.18.6 Esercizio ....................................196 1.19 Software cracking ..................................196 1.20 Impossible shutdown practical joke (Windows 7) . 198 1.21 switch()/case/default ................................199 1.21.1 Pochi casi ...................................199 1.21.2 Molti casi ....................................214 1.21.3 Ancora più istruzioni case in un unico blocco . 228 1.21.4 Fall-through ..................................233 1.21.5 Esercizi .....................................235 1.22 Cicli ...........................................236 1.22.1 Semplice esempio ..............................236 1.22.2 Routine di copia blocchi di memoria . 250 1.22.3 Controllo condizione .............................253 1.22.4 Conclusione ..................................254 1.22.5 Esercizi .....................................257 1.23 Maggiori informazioni sulle stringhe . 257 1.23.1 strlen() .....................................257 v 1.23.2 Delimitazione delle stringhe . 271 1.24 Sostituzione di istruzioni aritmetiche con altre . 271 1.24.1 Moltiplicazioni .................................271 1.24.2 Divisioni ....................................278 1.24.3 Esercizio ....................................279 1.25 Array ...........................................279 1.25.1 ..........................................279 1.25.2 ..........................................279 1.25.3 Esercizi .....................................279 1.26 Strutture ........................................280 1.26.1 UNIX: struct tm ................................280 1.26.2 ..........................................280 1.26.3 Esercizi .....................................280 1.27 ..............................................280 1.27.1 ..........................................280 2 Italian text placeholder 281 2.1 Endianness ........................................281 2.1.1 Big-endian ....................................281 2.1.2 Little-endian ...................................281 2.1.3 Esempio .....................................282 2.1.4 Bi-endian .....................................282 2.1.5 Converting data ................................282 2.2 Memoria .........................................283 2.3 CPU ............................................284 2.3.1 Branch predictors ...............................284 2.3.2 Data dependencies ..............................284 3 285 4 Java 286 4.1 Java ............................................286 4.1.1 Introduzione ...................................286 4.1.2 Ritornare un valore ..............................287 4.1.3 Semplici funzioni di calcolo . 293 4.1.4 ...........................................296 4.1.5 ...........................................296 4.1.6 ...........................................296 5 297 5.1 Linux ...........................................297 5.1.1 LD_PRELOAD hack in Linux . 297 5.2 Windows NT .......................................300 5.2.1 Windows SEH ..................................300 6 Strumenti 301 6.1 Analisi di Binari .....................................301 6.1.1 Disassemblers .................................302 6.1.2 Decompilers ...................................302 6.1.3 Comparazione Patch/diffing . 302 vi 6.2 Analisi live ........................................302 6.2.1 Debuggers ....................................302 6.2.2 Tracciare chiamate alle librerie . 303 6.2.3
Recommended publications
  • Towards a Toolchain for Exploiting Smart Contracts on the Ethereum Blockchain
    Towards a Toolchain for Exploiting Smart Contracts on the Ethereum Blockchain by Sebastian Kindler M.A., University of Bayreuth, 2011 Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in the Computer Science Program Faculty of Computer Science Supervisor: Prof. Dr. Stefan Traub Second Assessor: Prof. Dr. Markus Schäffter External Assessor: Dr. Henning Kopp Ulm University of Applied Sciences March 22, 2019 Abstract The present work introduces the reader to the Ethereum blockchain. First, on a con- ceptual level, explaining general blockchain concepts, and viewing the Ethereum blockchain in particular from different perspectives. Second, on a practical level, the main components that make up the Ethereum blockchain are explained in detail. In preparation for the objective of the present work, which is the analysis of EVM bytecode from an attacker’s perspective, smart contracts are introduced. Both, on the level of EVM bytecode and Solidity source code. In addition, critical assem- bly instructions relevant to the exploitation of smart contracts are explained in detail. Equipped with a definition of what constitutes a vulnerable contract, further practical and theoretical aspects are discussed: The present work introduces re- quirements for a possible smart contract analysis toolchain. The requirements are viewed individually, and theoretical focus is put on automated bytecode analysis and symbolic execution as this is the underlying technique of automated smart contract analysis tools. The importance of semantics is highlighted with respect to designing automated tools for smart contract exploitation. At the end, a min- imal toolchain is presented, which allows beginners to efficiently analyze smart contracts and develop exploits.
    [Show full text]
  • 1 SEC Consult – Cyber Security Challenge Austria / CTF Tips & Tricks
    SEC Consult – Austria Cyber Security Challenge Tips & Tricks Responsible: R. Freingruber Version/Date: 1.0 / 26.04.2018 Confidentiality class: Public 1 SEC Consult – Cyber Security Challenge Austria / CTF Tips & Tricks This article is intended to give useful tips and tricks for participants of the Cyber Security Challenge Austria, however in general, it can be seen as a guideline to Capture-the-Flag (CTF) competitions. The first chapter is for beginners who don’t know where they can acquire the required skills to participate and how to get started. The later chapters give some hints for various categories in CTFs. Please note that the tips range from basic tips to more complex ones like “how to solve hard binaries” or “how to win attack-defense CTFs” (which is very likely not required for Cyber Security Challenge Austria). Please also note that the article has a strong focus on the binary / exploit category because that’s the authors main category. 1.1 How to get started? This chapter is for people who want to do more in the field of IT security, but who don’t know how to get started and where the required knowledge can be learned. The best source of information are books that summarize the most common attack techniques and protections against them. Since the entire topic of IT security is very extensive there is not a “one-size-fits- all” book which lists all attacks in-depth. Instead, there are standard books which cover specific topics. The following list is not exhaustive, but tries to list the best books (in the authors opinion) for the respective topics: • Web o The Web Application Hackers Handbook by Dafydd Stuttard ▪ The standard book on web attacks which covers lots of different topics.
    [Show full text]
  • Reverse Software Engineering As a Project-Based Learning Tool
    Paper ID #33764 Reverse Software Engineering as a Project-Based Learning Tool Ms. Cynthia C. Fry, Baylor University CYNTHIA C. FRY is currently a Senior Lecturer of Computer Science at Baylor University. She worked at NASA’s Marshall Space Flight Center as a Senior Project Engineer, a Crew Training Manager, and the Science Operations Director for STS-46. She was an Engineering Duty Officer in the U.S. Navy (IRR), and worked with the Naval Maritime Intelligence Center as a Scientific/Technical Intelligence Analyst. She was the owner and chief systems engineer for Systems Engineering Services (SES), a computer systems design, development, and consultation firm. She joined the faculty of the School of Engineering and Computer Science at Baylor University in 1997, where she teaches a variety of engineering and computer science classes, she is the Faculty Advisor for the Women in Computer Science (WiCS), the Director of the Computer Science Fellows program, and is a KEEN Fellow. She has authored and co- authored over fifty peer-reviewed papers. Mr. Zachary Michael Steudel Zachary Steudel is a 2021 graduate of Baylor University’s computer science department. In his time at Baylor, he worked as a Teaching Assistant under Ms. Cynthia C. Fry. As part of the Teaching Assistant role, Zachary designed and created the group project for the Computer Systems course. Zachary Steudel worked as a Software Developer Intern at Amazon in the Summer of 2019, a Software Engineer Intern at Microsoft in the Summer of 2020, and begins his full-time career with Amazon in the summer of 2021 as a software engineer.
    [Show full text]
  • Flexible Software Protection
    Flexible Software Protection JENS VAN DEN BROECK, BART COPPENS, and BJORN DE SUTTER, Department of Electronics and Information Systems, Ghent University, Belgium To counter software reverse engineering or tampering, software obfuscation tools can be used. However, such tools to a large degree hard-code how the obfuscations are deployed. They hence lack resilience and stealth in the face of many attacks. To counter this problem, we propose the novel concept of flexible obfuscators, which implement protections in terms of data structures andAPIs already present in the application to be protected. The protections are hence tailored to the application in which they are deployed, making them less learnable and less distinguishable. In our research, we concretized the flexible protection concept for opaque predicates. We designed an interface to enable the reuse of existing data structures and APIs in injected opaque predicates, we analyzed their resilience and stealth, we implemented a proof-of-concept flexible obfuscator, and we evaluated it on a number of real-world use cases. This paper presents an in-depth motivation for our work, the design of the interface, an in-depth security analysis, and a feasibility report based on our experimental evaluation. The findings are that flexible opaque predicates indeed provide strong resilience and improved stealth, but also that their deployment is costly, and that they should hence be used sparsely to protect only the most security-sensitive code fragments that do not dominate performance. Flexible obfuscation therefor delivers an expensive but also more durable new weapon in the ever ongoing software protection arms race. CCS Concepts: • Security and privacy ! Software security engineering; Software reverse engineering.
    [Show full text]
  • INFILTRATE Ghidra
    Three Heads Are Better Than One: Mastering NSA's Ghidra Reverse Engineering Tool Alexei Bulazel Jeremy Blackthorne @0xAlexei @0xJeremy github.com/0xAlexei/INFILTRATE2019 Disclaimer This material is based on the publicly released Ghidra, there is no classified information in this presentation Alexei Bulazel @0xAlexei ● Senior Security Researcher at River Loop Security ● Research presentations and publications: ○ Presentations at REcon (MTL & BRX), SummerCon, DEFCON, Black Hat, etc. ○ Academic publications at USENIX WOOT and ROOTS ○ Cyber policy in Lawfare, etc. ● Collaborated with Jeremy on research at RPI, MIT Lincoln Laboratory, and Boston Cybernetics Institute ● Proud RPISEC alumnus Jeremy Blackthorne @0xJeremy ● Instructor at the Boston Cybernetics Institute ● PhD candidate at RPI focused on environmental keying ● Former researcher at MIT Lincoln Laboratory ● United States Marine Corps 2002 - 2006 ● RPISEC alumnus Outline 1. Intro 2. Interactive Exercises a. Manual Static Analysis b. Scripting Ghidra 3. P-Code & SLEIGH 4. Discussion 5. Conclusion Participating 1. Install OpenJDK 11, add its bin directory to your PATH ● jdk.java.net/11 2. Download Ghidra ● ghidra-sre.org ● github.com/NationalSecurityAgency/ghidra/releases 3. Download our demo scripts and binaries ● github.com/0xAlexei/INFILTRATE2019 Ghidra ● Java-based interactive reverse engineering tool developed by US National Security Agency - similar in functionality to IDA Pro, Binary Ninja, etc… ○ Static analysis only currently, debugger support promised to be coming soon ○ Runs on Mac, Linux, and Windows ● All credit for creating Ghidra goes to the developers at NSA ● Released open source at RSA in March 2019 ○ 1.2M+ lines of code ● NSA has not discussed the history of the tool, but comments in source files go as far back as February 1999 Outline 1.
    [Show full text]
  • Pypanda: Taming the Pandamonium of Whole System Dynamic Analysis
    PyPANDA: Taming the PANDAmonium of Whole System Dynamic Analysis Luke Craig∗, Andrew Fasano∗y, Tiemoko Ballo∗, Tim Leek∗ Brendan Dolan-Gavittz William Robertsony ∗MIT Lincoln Laboratory {Luke.Craig,Andrew.Fasano,Tleek,Tiemoko.Ballo}@ll.mit.edu yNortheastern University [email protected], [email protected] zNew York University [email protected] Abstract—When working with real world programs, dy- IDA Pro1, and Ghidra2 all support conducting analyses namic analyses often must be run on a whole-system instead of from scripting languages, such functionality is rarely just a single binary. Existing whole-system dynamic analysis present in whole-system dynamic analysis platforms lead- platforms generally require analyses to be written in compiled languages, a suboptimal choice for many iterative analysis ing to cumbersome workflows. For example, consider the tasks. Furthermore, these platforms leave analysts with a split task of conducting a whole-system dynamic taint analysis view between the behavior of the system under analysis and on data sent to a custom kernel module that ultimately the analysis itself—in particular the system being analyzed flow into a user space application. An analyst must must commonly be controlled manually while analysis scripts approach this task through two distinct, but complemen- are run. To improve this process, we designed and imple- mented PyPANDA, a Python interface to the PANDA dynamic tary, processes. First, they must drive the guest system’s analysis platform. PyPANDA unifies the gap between guest behavior: boot the system, log in, obtain the relevant virtual machines behavior and analysis tasks; enables painless source code and toolchains, compile the code (or copy in a integrations with other program analysis tools; and greatly prebuilt binary), and load the kernel module.
    [Show full text]
  • Get the Most from Capture the Flag
    Maximum CTF Get the most from capture the flag Friday, July 31, 2009 capture the flag (Two Toy Soldiers) http://www.flickr.com/photos/janramroth/2264184078/ http://creativecommons.org/licenses/by/2.0/deed.en jot.punkt lightning round "Hack the planet______" Friday, July 31, 2009 Trivia 100 from 2006 qualifier. And yeah this should be insanely obvious. The funny part though is that the next year, the 100 point question was The thunder and lightning RonAlmog http://www.flickr.com/photos/ronalmog/2053473900/ http://creativecommons.org/licenses/by/2.0/deed.en lightning round "Hack the planet______" Friday, July 31, 2009 Trivia 100 from 2006 qualifier. And yeah this should be insanely obvious. The funny part though is that the next year, the 100 point question was The thunder and lightning RonAlmog http://www.flickr.com/photos/ronalmog/2053473900/ http://creativecommons.org/licenses/by/2.0/deed.en lightning round "_____Hack the planet" Friday, July 31, 2009 And likewise, the year after that: lightning round "_____Hack the planet" Friday, July 31, 2009 And likewise, the year after that: lightning round "Hack the___ planet" Friday, July 31, 2009 A fair amount of CTF has been inside jokes and homages to years past. If you plan on participating, check out and practice on previous years answers and writeups as they will make your life much easier. lightning round "Hack the___ planet" Friday, July 31, 2009 A fair amount of CTF has been inside jokes and homages to years past. If you plan on participating, check out and practice on previous years answers and writeups as they will make your life much easier.
    [Show full text]
  • Ghidra Vs Radare2
    Ghidra Vs Radare2 Radare2 – is a framework built for reverse engineering and analyzing binaries. js File size differs 2462470 vs 2461765 Buffer truncated to 2461765 byte(s) (705 not compared) 86611 So… the WebAssembly is essentially generating JavaScript on-the-fly. With the addition, the latest UFC 257 lineup includes: Conor McGregor vs. Plugin manager for x64dbg. radare2 tools. Я открываю программу в Cutter — GUI для radare2 со встроенным декомпилятором ghidra, имеющим возможность эмуляции, а с недавних пор и отладки. Plugin manager for x64dbg. 7 місяців тому. Watch the UFC 257 "McGregor vs. With radare2 you can analyze, disassemble. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minute long, summary of current network security related events. radare2 was added by Tim_B in Sep 2016 and the latest update was made in Apr 2018. Free and Open Source RE Platform powered by Rizin. Ve srovnání s komerčním IDA je pomalejší a má víc chyb. Even if you know how to disassemble a Brown iron, this will not help. IDA Pro is a programmable, interactive, and multi-processor disassembler combined with a local and remote debugger and augmented by a complete plugin programming environment. 0 has been released!. We are using radare2 together with avr-gdb and simavr to reverse engineer the challenge "Jumpy" which implemets a password checking algorithm В видео речь пойдет про Ida Pro (free) x64dbg (плагины snowmen, x64dbg2ghidra) Ghidra Radare2 Затрону поверхностно windbg, binary ninja. pdf - Free ebook download as PDF File (. Patching Binaries (with vim, Binary Ninja, Ghidra and radare2) - bin 0x2F.
    [Show full text]
  • Mobile Data Analysis Using Dynamic Binary Instrumentation and Static Analysis
    Air Force Institute of Technology AFIT Scholar Theses and Dissertations Student Graduate Works 3-2020 Mobile Data Analysis using Dynamic Binary Instrumentation and Static Analysis Christopher Dukarm Follow this and additional works at: https://scholar.afit.edu/etd Part of the Computer Sciences Commons Recommended Citation Dukarm, Christopher, "Mobile Data Analysis using Dynamic Binary Instrumentation and Static Analysis" (2020). Theses and Dissertations. 3157. https://scholar.afit.edu/etd/3157 This Thesis is brought to you for free and open access by the Student Graduate Works at AFIT Scholar. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of AFIT Scholar. For more information, please contact [email protected]. Mobile Data Analysis using Dynamic Binary Instrumentation and Static Analysis THESIS Christopher Dukarm, 2d Lt, USAF AFIT-ENG-MS-20-M-016 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio DISTRIBUTION STATEMENT A APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. The views expressed in this document are those of the author and do not reflect the official policy or position of the United States Air Force, the United States Department of Defense or the United States Government. This material is declared a work of the U.S. Government and is not subject to copyright protection in the United States. AFIT-ENG-MS-20-M-016 Mobile Application Data Analysis using Dynamic Binary Instrumentation and Static Analysis THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of Engineering and Management Air Force Institute of Technology Air University Air Education and Training Command in Partial Fulfillment of the Requirements for the Degree of Master of Science in Cyber Operations Christopher Dukarm, B.S.C.S.
    [Show full text]
  • Lecture 1 Introduction
    Lecture 1 Introduction. Basic Exploration Tools Computer and Network Security 30th of September 2019 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 1, Introduction. Basic Exploration Tools 1/52 Outline Introduction Things You Need to Know Tools of the Trade (That You May or May Now Know) Basic Tools for Exploration Demo Conclusion CSE Dep, ACS, UPB Lecture 1, Introduction. Basic Exploration Tools 2/52 On this class I Computer and Network Security I offensive security, hacking, reverse engineering, runtime application security I programming/practical oriented I focus on binary exploitation (pwn levels in CTFs) I lecture: Monday, 6pm-8pm, room PR002, R˘azvan I labs: I Monday, 4pm-6pm, room PR706, S, tefania I Monday, 8pm-10pm, room PR706, Mihai I Monday, 8pm-10pm, room EG106, Adrian I Monday, 8pm-10pm, room EG306, Dennis I http://ocw.cs.pub.ro/cns/ I but first: https://ocw.cs.pub.ro/courses/cns/need-to-know I labs start on Monday, 30th of September 2019, 8pm I last instance of the first lab on Monday, 7th of October 2019, 4pm, room PR706 CSE Dep, ACS, UPB Lecture 1, Introduction. Basic Exploration Tools 3/52 The Team I R˘azvanDeaconescu: lectures, lecture tests, exam I Mihai Dumitru: labs, infrastructure I S, tefania Popescu: labs I Dennis Plosceanu: labs I Adrian S, endroiu: labs, assignments, lectures CSE Dep, ACS, UPB Lecture 1, Introduction. Basic Exploration Tools 4/52 Resources I wiki (content): http://ocw.cs.pub.ro/cns/ I Moodle (news, deadlines, exam, dicussions, links to content, feedback) I SRIC (enrolable)
    [Show full text]
  • An Empirical Study on ARM Disassembly Tools
    An Empirical Study on ARM Disassembly Tools Muhui Jiang Yajin Zhou∗ Xiapu Luo [email protected] [email protected] [email protected] The Hong Kong Polytechnic Zhejiang University The Hong Kong Polytechnic University China University China China Ruoyu Wang Yang Liu Kui Ren [email protected] [email protected] [email protected] Arizona State University Nanyang Technological University Zhejiang University USA Singapore China Institute of Computing Innovation, Zhejiang University China ABSTRACT CCS CONCEPTS With the increasing popularity of embedded devices, ARM is becom- • Software and its engineering ! Assembly languages. ing the dominant architecture for them. In the meanwhile, there is a pressing need to perform security assessments for these devices. KEYWORDS Due to different types of peripherals, it is challenging to dynami- Disassembly Tools, ARM Architecture, Empirical Study cally run the firmware of these devices in an emulated environment. Therefore, the static analysis is still commonly used. Existing work ACM Reference Format: Muhui Jiang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu, and Kui Ren. usually leverages off-the-shelf tools to disassemble stripped ARM 2020. An Empirical Study on ARM Disassembly Tools. In Proceedings of binaries and (implicitly) assume that reliable disassembling binaries the 29th ACM SIGSOFT International Symposium on Software Testing and and function recognition are solved problems. However, whether Analysis (ISSTA ’20), July 18–22, 2020, Virtual Event, USA. ACM, New York, this assumption really holds is unknown. NY, USA, 14 pages. https://doi.org/10.1145/3395363.3397377 In this paper, we conduct the first comprehensive study on ARM disassembly tools.
    [Show full text]
  • Download Disassembler Windows
    Download disassembler windows click here to download Browse All Files Windows BSD Mac Linux. Description. Udis86 is an easy-to-use minimalistic disassembler library for the x86 and x PEBrowse Professional - a Windows portable executable file viewer/dissection utility and disassembler. Windows Disassembler for bit & bit Programs. Download PEBrowse64 Professional. for Windows 10, Windows. Win32Program Disassembler, free and safe download. Win32Program Disassembler latest version: A free Development program for Windows. Win32Program. the most popular disassemblers recently. /downloads/browse/OllyDbg_Plugins ​x86 Disassemblers · ​Disassembler Issues · ​Decompilers · ​A General view of. Windows Disassembler for bit & bit Programs. 23/12/ | by maldevel. PEBrowse64 Screenshot of PEBrowse Professional: Download from here. Download software in the Debuggers/Decompilers/Disassemblers category. Windows 10 / Windows 8 / Windows 7 / Windows Vista / Windows XP. executable. Pros: None. Cons: None. Other Thoughts: Download debugger from site,but watch out for the 2nd or 3rd 'extra' debugger files available for. The IDA Disassembler and debugger is a multi-processor disassembler and debugger hosted on the Windows, Linux and Mac OS X Platforms. JD Java Decompiler. The “Java Decompiler project” aims to develop tools in order to decompile and analyze Java 5 “byte Overview; Download; Changes. The Ultimate Disassembler. Download bit/bit DLLs & static libraries for Microsoft Windows bit/bit. cstool (www.doorway.ru). Win The Proview (a.k.a PVDasm) Disassembler is Free, Interactive, Multi-CPU (Intel 80x86/ Chip8) that includes many features which Debuggers / Disassemblers [ Useful debugger and disassembler engines ] Download. IDA Pro Disassembler and Debugger [ Find previous and the latest IDA Pro can be used as a local and as a remote debugger on the 80x86 (typically Windows/Linux) and the ARM plaform (typically Windows Download.
    [Show full text]