Fox Book
UPCOMING

Book Series

Arm Reverse Engineering Exploitation Vulnerability Analysis Exploit Mitigations

Azeria Book
About Azeria Labs

“Azeria Labs is the foremost training company for security-focused Arm exploitation and reverse-engineering, and has grown beyond belief, providing private trainings all over the world, partnering with many of the industry-leading security conferences, and training hundreds of security engineers how to attack— and consequently how to defend —IoT and other Arm-based devices. Since 2018, Azeria Labs also partners with Arm Ltd. itself, collaborating on exploit mitigation research and educating developers on security features to harden their software.

I am excited to announce that in Summer/Fall 2022, I will be publishing my first book on Arm Assembly and Reverse Engineering (first book of this series) through Wiley. It is a range of topics very close to my heart, and I could not be more excited to share it with you“

EST.

2017
About Azeria Labs
About Azeria Labs
About Azeria Labs

“Azeria Labs is the foremost training company for security-focused Arm exploitation and reverse-engineering, and has grown beyond belief, providing private trainings all over the world, partnering with many of the industry-leading security conferences, and training hundreds of security engineers how to attack— and consequently how to defend —IoT and other Arm-based devices. Since 2018, Azeria Labs also partners with Arm Ltd. itself, collaborating on exploit mitigation research and educating developers on security features to harden their software.

I am excited to announce that in Summer/Fall 2020, we will be publishing a series of books through Wiley, covering topics like reverse-engineering, exploit development, vulnerability discovery, and exploit mitigations. It is a range of topics very close to my heart, and I could not be more excited to share it with you“

Arm Security

For Security Researchers Software Engineers Hackers Defenders

Security researchers and software engineers benefit from real in-depth knowledge of Arm assembly and reverse engineering. This book takes you step-by-step on your path to reading programs compiled for Arm processors using dynamic and static analysis, and how to write your own Arm assembly code in both 32-bit and 64-bit.

Learn how to spot security vulnerabilities in programs compiled for Arm, including the vulnerability categories of stack- and heap-based buffer overflows, information leaks, integer overflows and underflows, use-after-free, double-free and invalid-free vulnerabilities, and how they are exploited.

See how operating system, processor, and compiler designers defend against memory-corruption exploits using exploit mitigations like Address Space Layout Randomization, Execute Never, Stack Canaries and Pointer Authentication. Find out how to use them in your own programs to make them more secure, and learn the techniques hackers have developed to circumvent these anti-exploit features.

Arm Assembly

Learn the fundamentals of the Arm architecture and familiarize yourself with both Arm 32-bit and 64-bit Assembly.

Static Analysis

Learn program flow patterns and how to use free tools to reverse engineer binaries compiled for Arm processors.

Dynamic Analysis

Learn how to debug Arm binaries and processes to trigger and analyze real-world vulnerabilities.

Vulnerability Discovery

Learn about different types of vulnerabilities and how to identify them through reverse engineering.

Exploit Mitigations

Get an in-depth understanding on how exploit mitigations work and how they make exploitation more difficult.

Mitigation Bypasses

Learn the techniques hackers use to bypass exloit mitigations with hands-on exploit engineering examples.

The Author

Harry Jones
Maria Markstedter
Founder and CEO, Azeria Labs

Maria is the founder and CEO of Azeria Labs, offering services and trainings at top-tier security conferences including Black Hat and Infiltrate, as well as on-site private training for large tech companies and consulting law enforcement agencies. She holds a Bachelor’s degree in Corporate and IT Security and a Master’s degree in Enterprise and IT Security. In 2018, Maria became a Forbes “30 under 30” list member for technology and has been featured in Vogue Business Magazine. In 2020 Maria was named the Forbes Person of the Year in Cybersecurity. She is a member of both the Black Hat® EU and US Trainings and Briefings Review Board.

Her research focus is on Mobile and IoT reverse engineering and binary exploitation, as well as exploit mitigations and bypasses. Maria worked on exploit mitigation research alongside Arm in Cambridge and continues to educate security researchers and developers around the world on attacking and defending Arm binary applications.

Subscribe for Updates

Sign up to get the latest developments on this book, new blogs, and online training releases delivered straight to your inbox.