|
|
|
folta |
|
|||
Новичок Профиль Группа: Участник Сообщений: 6 Регистрация: 19.6.2012 Репутация: нет Всего: нет |
Программирование на ассемблере на платформе x86-64 - Руслан Аблязов
(17.1 мб = 13.5 pdf + source+fasm+utils) http://rghost.ru/37588938 |
|||
|
||||
felixtt |
|
|||
Новичок Профиль Группа: Участник Сообщений: 2 Регистрация: 13.4.2013 Репутация: нет Всего: нет |
В данный архив входят :
Рассылка Калашникова. Хорошие уроки для начинающих программировать на ассемблере; Юрий Магда.Ассемблер для процессоров Intel Pentium (исходники прил.); Бурдаев, Иванов, Тетерин - Ассемблер в задачах защиты информации; Ассемблер под ДОС; Assembler & Win32; Крупник - Опыт дизассемблирования большой .com программы; Питер Абель - Ассемблер и программирование для IBM PC; Программирование и кодирование; Орлов С.Б. - Справочник по системе программирования Tyrbo Ассемблер 2.0(4 части); Документация по Turbo Debugger; Курс практических работ по программированию на Assembler; Пособие- теория по Assembler-у; Ассемблер под Windows; Macro Assembler v4.02; Linker v4.02; Система программирования на макроассемблере MS-DOS; Справка по Ассемблеру для AVR; Описание IDA-debug(10 частей); Дэвид Бредли - Assembler для начинающих; Крис Касперски - Тонкости дизассемблирования; Уроки Икзелиона (Iczelion); Дж.Роббинс - Отладка приложений; Зубков - Ассемблер для DOS, Windows и Unix; В.Ю.Пирогов - Assembler для Windows; Зубков - Assembler. Язык неограниченных возможностей; Минаев, Самойленко - Программируемые Логические контроллеры; Дж.Козиол - Искусство взлома и защиты систем; Н.Голубь - Искусство программирования на Ассемблере 3-е изд.; З.П. Вострикова - Программирование на языке Ассемблера. Данный архив имеет достаточну информации для того, что бы вы выучили язык Ассемблера в идеале и даже более того, данный архив включает в себя много полезной практической документации. Для школьников, студентов и вообще всех, кого интересует этот низкоуровневый язык. СКАЧАТЬ ЗЕРКАЛО |
|||
|
||||
null56 |
|
|||
Опытный Профиль Группа: Участник Сообщений: 721 Регистрация: 19.3.2008 Репутация: нет Всего: 12 |
подскажите пожалуйста, где можно взять информацию про асм под ARM архитектуру? ни одной книги не видел, лишь куски в интернете. или ресурс подскажите пожалуйста
|
|||
|
||||
Viacheslav78 |
|
|||
Новичок Профиль Группа: Участник Сообщений: 3 Регистрация: 9.4.2016 Где: Россия Репутация: нет Всего: нет |
Книги по Debugging
Bill Blunden. Software Exorcism. A Handbook for Debugging and Optimizing Legacy Code. Brian W. Fitzpatrick. Debugging Teams. Better Productivity through Collaboration. Butcher Paul. Debug It. Find, Repair, and Prevent Bugs in Your Code. Debugging Linux Systems with GNU GDB. Eric Lawrence. Debugging with Fiddler. The complete reference from the creator of the Fiddler Web Debugger. Mario Hewardt, Daniel Pravat. Advanced Windows Debugging. Mario Hewardt. Advanced .NET Debugging. Matthew A. Telles, Yuan Hsieh. The Science of Debugging. Norman Matloff. Peter Jay Salzman. THE ART OF DEBUGGING WITH GDB, DDD, AND ECLIPSE. Rajaram Regupathy. Bootstrap Yourself with Linux-USB Stack. Design, Develop, Debug, and Validate Embedded USB Systems. Richard Foley. Pro Perl Debugging. From Professional to Expert. Richard H. Carver, Kuo-Chung Tai. Modern Multithreading Implementing, Testing, and Debugging Multithreaded Java and C++ & Pthreads & Win32 Programs. Richard Stallman, Roland Pesch, Stan Shebs, et al. Debugging with GDB - the GNU Source-Level Debugger. Steve Maguire. Debugging the Development Process. Tarik Soulami. Inside Windows Debugging. A Practical Guide to Debugging and Tracing Strategies in Windows. Thorsten Grötker, Ulrich Holtmann, Holger Keding, Markus Wloka. The Developer's Guide to Debugging. Cristina Cifuentes. Reverse Compilation Techniques. Анализ уязвимостей Abraham Ghebrehiwet Ghebremedhin. Combining Static Source Code Analysis and Threat Assessment Modeling For Testing Open Source Software Security. Adam Loe Doup´e. Advanced Automated Web Application Vulnerability Analysis. Antti Vayrynen. Finding third-party components with binary analysis. David B. Dewey. FINDING AND REMEDYING HIGH-LEVEL SECURITY ISSUES IN BINARY CODE. David Brumley. Analysis and Defense of Vulnerabilities in Binary Code. Fabian Yamaguchi. Automated Extraction of API Usage Patterns from Source Code for Vulnerability Identification. Fabian Yamaguchi. Pattern-Based Vulnerability Discovery. Falko Strenzke. Efficiency and Implementation Security of Code-based Cryptosystems. Francisco Jose Marques Vieira. Realistic Vulnerability Injections in PHP Web Applications. George Perera. PURPOSEFULLY MANUFACTURED VULNERABILITIES IN U.S. GOVERNMENT TECHNOLOGY MICROCHIPS. RISKS AND HOMELAND SECURITY IMPLICATIONS. Guidelines for Implementation of REST. Gustav Ahlberg. Generating web applications containing XSS and CSRF vulnerabilities. Jay-Evan J. Tevis. AUTOMATIC DETECTION OF SOFTWARE SECURITY VULNERABILITIES IN EXECUTABLE PROGRAM FILES. Jing Xie. INTERACTIVE PROGRAMMING SUPPORT FOR SECURE SOFTWARE DEVELOPMENT. Mario Heiderich. Towards Elimination of XSS Attacks with a Trusted and Capability Controlled DOM. Martin Johns. Code Injection Vulnerabilities in Web Applications - Exemplified at Cross-site Scripting. Prateek Saxena. Systematic Techniques for Finding and Preventing Systematic Techniques for Finding and Preventing. Rami M. F. Jnena. Modern Approach for WEB Applications Vulnerability Analysis. Richard Wartell. REWRITING X86 BINARIES WITHOUT CODE PRODUCER COOPERATION. Runar Moen. Creating secure software. Ryan Dewhurst. Implementing Basic Static Code Analysis into Integrated Development Environments (IDEs) to Reduce Software Vulnerabilities. Sidney E Valentine. PLC Code Vulnerabilities Through SCADA Systems. Sooel Son, B.S., M.S. Toward Better Server-side Web Security. SRUTHI BANDHAKAVI. AUTOMATED DETECTION OF INJECTION VULNERABILITIES IN WEB APPLICATIONS. Steven Craig Hanna Jr. Attacks on Emerging Architectures. Thomas Hofer. Evaluating Static Source Code Analysis Tools. Tyler Bletsch. Code-Reuse Attacks. New Frontiers and Defenses. Wolf-Steffen Rodiger. Merging Static Analysis and Model Checking for Improved Security Vulnerability Detection. Yuchen Zhou. Improving Security and Privacy of Integrated Web Applications. Язык программирования ассемблер Blum Richard. Professional Assembly Language. Cavanagh Joseph. X86 Assembly Language and C Fundamentals. Duntemann Jeff. Assembly Language Step-by-Step. Programming with Linux. Irvine K.R. Assembly Language for x86 Processors. Seventh Edition. Irvine K.R. Assembly Language for x86 Processors. Sixth Edition. Kusswurm D. Modern X86 Assembly Language Programming. 32-bit, 64-bit, SSE, and AVX. Leiterman J.C. 32-64-Bit 80x86 Assembly Language Architecture. Book convert from CHM format. Neveln Bob. Linux Assembly Language Programming. Rose Chris. Assembly Language Succinctly. Seyfarth Ray. Introduction to 64 Bit Intel Assembly Language Programming for Linux. Hyde R. The Art of Assembly Language (Second Edition). Dandamudi S.P. Guide to Assembly Language Programming in Linux. Книги по ARM Holt W. ARM Assembly Language. Fundamentals and Techniques. Langbridge J.A. Professional Embedded ARM Development. Магда Ю.С. Программирование и отладка C C++ приложений для микроконтроллеров ARM. Tay Raymond. OpenCL Parallel Programming Development Cookbook. Mahout Vincent. Assembly Language Programming ARM Cortex-M3. Sloss Andrew N. Symes D. Wright C. ARM System Developers Guide. Designing and Optimizing System Software. Valvano J.W. Embedded Systems. Introduction to Arm Cortex-M Microcontrollers. Volume 1. Yui J. The Definitive Guide to ARM Cortex-M0 and Cortex-M0+ Processors. Это сообщение отредактировал(а) Viacheslav78 - 9.4.2016, 15:25 |
|||
|
||||
Viacheslav78 |
|
|||
Новичок Профиль Группа: Участник Сообщений: 3 Регистрация: 9.4.2016 Где: Россия Репутация: нет Всего: нет |
Reverse Engineering
Bell Simon. Building a Honeypot to Research Cyber-Attack Techniques. Bryant R. Adam. UNDERSTANDING HOW REVERSE ENGINEERS MAKE SENSE OF PROGRAMS FROM ASSEMBLY LANGUAGE REPRESENTATIONS. Cipresso Teodoro. Software reverse engineering education. Dyrkolbotn Geir Olav. Reverse Engineering Microprocessor Content Using Electromagnetic Radiation. Fonseca Jose Manuel Rios. Interactive Decompilation. Garzon Miguel. Reverse Engineering Object-Oriented Systems into Umple. An Incremental and Rule-Based Approach. Greevy Orla. Enriching Reverse Engineering with Feature Analysis. Hauke D. Jonathan. Design Verification Using Reverse Engineering. Holger Michael Kienle. Building Reverse Engineering Tools with Software Components. Kenny Wong. The Reverse Engineering Notebook. Lajos Jeno Fülop. Evaluating and Improving Reverse Engineering Tools. Lin Feifei (Amy). Analysing Reverse Engineering Techniques for Interactive Systems. Michael Kiperberg. Preventing Reverse Engineering of Native and Managed Programs. Morando Federico. SOFTWARE REVERSE ENGINEERING AND OPEN SOURCE SOFTWARE. Do we need more FUD to be satiated. Portillo Sergio Pastrana. Attacks Against Intrusion Detection Networks. Evasion, Reverse Engineering and Optimal Countermeasures. Prpic Martin. Reverse engineering of Java Card applets. Ramasubbu Surendranath. Reverse Software Engineering Large Object Oriented Software Systems using the UML Notation. Rosenblum Nathan E. THE PROVENANCE HIERARCHY OF COMPUTER PROGRAMS. Shi Nija. Reverse Engineering of Design Patterns from Java Source Code. UZELAC VLADIMIR. MICROBENCHMARKS AND MECHANISMS FOR REVERSE ENGINEERING OF MODERN BRANCH PREDICTOR UNITS. Vinju Jurgen Jordanus. Analysis and Transformation of Source Code by Parsing and Rewriting. Zhiqiang Lin. Reverse Engineering of Data Structures from Binary. Software Protection, Code Obfuscation, Malware Detection Alam Shahid. A Framework for Metamorphic Malware Analysis and Real-Time Detection. Alexandre Nuno Vicente Dias. Detecting Computer Viruses using GPUs. Aniket Kulkarni. Software Protection through Code Obfuscation. Batchelder R. Michael. JAVA BYTECODE OBFUSCATION. Bertholon Benoit. Towards Integrity and Software Protection in Cloud Computing Platforms. Birhanu Mekuria Eshete. Effective Analysis, Characterization, and Detection of Malicious Activities on the Web. Blaine Alan Nelson. Designing, Implementing, and Analyzing a System for Virus Detection. Bose Abhijit. Propagation, Detection and Containment of Mobile Malware. Brian M. Bowen. Design and Analysis of Decoy Systems for Computer Security. CAPPAERT Jan. Code Obfuscation Techniques for Software Protection. DAVIDSON RODRIGO BOCCARDO. Context-Sensitive Analysis of x86 Obfuscated Executables. Drape Stephen. INTELLECTUAL PROPERTY PROTECTION USING OBFUSCATION. Drape Stephen. Obfuscation of Abstract Data-Types. Farley, Ryan Joseph. Toward Automated Forensic Analysis of Obfuscated Malware. Flexeder Andrea. Interprocedural Analysis of Low-Level Code. Gupta, Divya. Program Obfuscation. Applications and Optimizations. HILLERT EMILIA.Obfuscate Java bytecode. An evaluation of obfuscating transformations using JBCO. Javaid Salman. Analysis and Detection of Heap-based Malwares Using Introspection in a Virtualized Environment. Khaled ElWazeer. DEEP ANALYSIS OF BINARY CODE TO RECOVER PROGRAM STRUCTURE. Khalid Mohamed Abdelrahman Y Alzarooni. Malware Variant Detection. Kinder Johannes. Static Analysis of x86 Executables. Statische Analyse von Programmen in x86 Maschinensprache. Konstantinou Evgenios. Metamorphic Virus. Analysis and Detection. Lixi Chen. Code Obfuscation Techniques for Software Protection. Large-Scale Malware Analysis, Detection, and Signature Generation. Lengyel Tamas Kristof. Malware Collection and Analysis via Hardware Virtualization. Mayank Varia. Studies in Program Obfuscation. Mohan R. Vishwath. SOURCE-FREE BINARY MUTATION FOR OFFENSE AND DEFENSE. Molnar David Alexander. Dynamic Test Generation for Large Binary Programs. Paleari Roberto. Dealing with next-generation malware. Paul R. Nathanael. Disk-Level Behavioral Malware Detection. Povalova Radoslava. Framework for Easy Malware Analysis. Preda Mila Dalla. Code Obfuscation and Malware Detection by Abstract Interpretation. Remi Andre B. Valvik. Security API for Java ME. Secure X data. Richardson Christopher. Virus detection with machine learning. RIERA FRANCISCO BLAS IZQUIERDO. LO! LLVM Obfuscator An LLVM obfuscator for binary patch generation. Rompf Tiark. Lightweight Modular Staging and Embedded Compilers. Abstraction without Regret for High-Level High-Performance Programming. Roundy A. Kevin. HYBRID ANALYSIS AND CONTROL OF MALICIOUS CODE. Sabu Emmanuel. Software Obfuscation Presentation. Shakya Sundar Das. Code Obfuscation using Code Splitting with Self-modifying Code. Sharath K. Udupa, Saumya K. Debray and Matias Madou. Deobfuscation Reverse Engineering Obfuscated Code. Sharif I. Monirul. ROBUST AND EFFICIENT MALWARE ANALYSIS AND HOST-BASED MONITORING. SOLODKYY YURIY. SIMPLIFYING THE ANALYSIS OF C++ PROGRAMS. Solofoarisina Arisoa Randrianasolo. Artficial Intelligence in Computer Security. Detection, Temporary Repair and Defense. SUN FANGQI. Program Analyses of Web Applications for Detecting Application-Specific Vulnerabilities. Tian Ronghua. An Integrated Malware Detection and Classification System. Venkatachalam Sujandharan. DETECTING UNDETECTABLE COMPUTER VIRUSES. Victor van der Veen. Dynamic Analysis of Android Malware. Wang Chenxi. A Security Architecture for Survivability Mechanisms. Wroblewski Gregory. General Method of Program Code Obfuscation (draft). |
|||
|
||||
Viacheslav78 |
|
|||
Новичок Профиль Группа: Участник Сообщений: 3 Регистрация: 9.4.2016 Где: Россия Репутация: нет Всего: нет |
LLVM
Arash Shahkar. ON MATCHING BINARY TO SOURCE CODE Arjun Shah. Metamorphic Code Generator based on bytecode of LLVM IR Christoph Erhardt. Design and Implementation of a TriCore Backend for the LLVM Compiler Framework Daniele Cono D’Elia. Flexible On-Stack Replacement in LLVM David Menendez. Termination-Checking for LLVM Peephole Optimizations Eric Schkufza. STOCHASTIC PROGRAM OPTIMIZATION FOR x86 64 BINARIES Federico Scrinzi. Behavioral Analysis of Obfuscated Code Johan Fänge. A Tracing JIT Compiler for Erlang Jozef Cel’uch. Java bytecode disassembler Linhai Song. Understanding, Detecting, and Diagnosing Real-World Performance Bugs Pooja Gupta. LLVM Backend Development for ReISC Architecture Roel Jordans. High-level software-pipelining in LLVM Simon Andreas Frimann Lund. A High Performance Backend for Array-Oriented Programming on Next-Generation Processing Units Tilmann Scheller. Where is LLVM being used today PE file & malware analysis Alan Martin Sweeney. Malware Analysis & Antivirus Signature Creation Blake Harrell Anderson. Integrating Multiple Data Views for Improved Malware Analysis Christian Rossow. Using Malware Analysis to Evaluate Botnet Resilience Christian Schönbein. PyBox - A Python Sandbox Christopher B. Harrison. ODinn. An In-Vivo Hypervisor-based Intrusion Detection System for the Cloud Christos Papadiotis. Enhancing AV-avoidance capabilities of a PE crypter Dalbir Kaur R. Chhabra. Feature selection and clustering for malicious and benign software characterization Dan Sinema. AUTOMATED REVERSE ENGINEERING OF MALWARE TO DEVELOP NETWORK SIGNATURES TO MATCH WITH KNOWN NETWORK SIGNATURES Dimitrios A. Glynos. Packing Heat! Fadel Omar Shaban. Spyware Detection Using Data Mining for Windows Portable Executable Files Igor Santos, Xabier Ugarte-Pedrero Felix Brezo, Pablo G. Bringas. NOA. AN INFORMATION RETRIEVAL BASED MALWARE DETECTION SYSTEM Jani Hakkarainen. Malware Analysis Environment for Windows Targeted Malware Jarno Niemela. Statistical Analysis Of Malware Defence Methods Jay-Evan J. Tevis. AUTOMATIC DETECTION OF SOFTWARE SECURITY VULNERABILITIES IN EXECUTABLE PROGRAM FILES Jiyong Jang. Scaling Software Security Analysis to Millions of Malicious Programs and Billions of Lines of Code Jonathan Joseph Blount. Adaptive rule-based malware detection employing learning classifier systems Katja Hahn. Robust Static Analysis of Portable Executable Malware Lutz Bohne. Pandora’s Bochs. Automatic Unpacking of Malware MICHAEL STEPHEN THIEMS. OPTIMIZATION AND EXECUTABLE REGENERATION IN THE IMPACT BINARY REOPTIMIZATION FRAMEWORK Neel Bavishi. An Executable Packer Nicholas S. Kovach. Accelerating Malware Detection via a Graphics Processing Unit PAN-MING. Research on Detecting Mechanism for Trojan horse Based on PE file Peter Ekstrand Berg. Behavior-based Classification of Botnet Malware Raja M. Khurram Shahzad. Syed Imran Haider. Detection of Spyware by Mining Executable Files Ronny Merkel, Tobias Hoppe, Christian Kraetzer, Jana Dittmann. Statistical Detection of Malicious PE-Executables Fast Offline Analysisfor Shaked Bar. Kuluoz. Malware and botnet analysis Soon Chai Liang. Understanding behavioural detection of antivirus Steven Strandlund Hansen. Thor Mark Tampus Larsen. Dynamic Malware Analysis. Detection and Family Classification using Machine Learning Sverker Nilsson. Heapy. A Memory Profiler and Debugger for Python Vasileios Pappas. Defending against Return-Oriented Programming Vishwath R. Mohan. SOURCE-FREE BINARY MUTATION FOR OFFENSE AND DEFENSE Yaser Alosefer. Analysing Web-based Malware Behaviour through Client Honeypots Zhiqiang Lin. Reverse Engineering of Data Structures from Binary |
|||
|
||||
Правила форума "Asm для начинающих" | |
|
Если Вам понравилась атмосфера форума, заходите к нам чаще! С уважением, MAKCim. |
1 Пользователей читают эту тему (1 Гостей и 0 Скрытых Пользователей) | |
0 Пользователей: | |
« Предыдущая тема | Asm для начинающих | Следующая тема » |
|
По вопросам размещения рекламы пишите на vladimir(sobaka)vingrad.ru
Отказ от ответственности Powered by Invision Power Board(R) 1.3 © 2003 IPS, Inc. |