Assembly Language and Reverse Engineering starts with an introduction to all three flavors of ARM:bit, Thumb, andBit, It gives readers an introduction into how these operating systems function which will be the basis from which to investigate, attack, and secure billions of mobile devices, IoT devices, laptops, smartwatches, and more.
In covering ARM fundamentals the book covers architecture, privilege levels, and virtual memory,
Whatever the reader wants to accomplish with reverse engineering starts with understanding ARM assembly, The book looks at writing assembly, data types and registers, instruction sets and processor modes, instructions, operations, and branches, and how programs are loaded by the OS.
Ultimately the book introduces and dives deep into reversing ARM binaries, Readers will explore disassembling ARM binaries on Linux and using the previously secret NSA tool Ghidra to reverse engineer arm binaries, Deep attention is given to dynamic analysis, debugging, flow control patterns, and
instruction blocks, .