Fox Book
UPCOMING

Book Series

Arm Reverse Engineering Exploitation Vulnerability Analysis Exploit Mitigations

Azeria Book
About Azeria Labs

“Azeria Labs is the foremost training company for security-focused Arm exploitation and reverse-engineering, and has grown beyond belief, providing private trainings all over the world, partnering with many of the industry-leading security conferences, and training hundreds of security engineers how to attack— and consequently how to defend —IoT and other Arm-based devices. Since 2018, Azeria Labs also partners with Arm Ltd. itself, collaborating on exploit mitigation research and educating developers on security features to harden their software.

I am excited to announce that in Summer/Fall 2020, we will be publishing a series of books on Arm security through Wiley, covering topics like reverse-engineering, exploitation, vulnerability discovery, and exploit mitigations. It is a range of topics very close to my heart, and I could not be more excited to share it with you“

EST.

2017
About Azeria Labs
About Azeria Labs
About Azeria Labs

“Azeria Labs is the foremost training company for security-focused Arm exploitation and reverse-engineering, and has grown beyond belief, providing private trainings all over the world, partnering with many of the industry-leading security conferences, and training hundreds of security engineers how to attack— and consequently how to defend —IoT and other Arm-based devices. Since 2018, Azeria Labs also partners with Arm Ltd. itself, collaborating on exploit mitigation research and educating developers on security features to harden their software.

I am excited to announce that in Summer/Fall 2020, we will be publishing a series of books through Wiley, covering topics like reverse-engineering, exploit development, vulnerability discovery, and exploit mitigations. It is a range of topics very close to my heart, and I could not be more excited to share it with you“

Arm Security

For Security Researchers Software Engineers Hackers Defenders

Security researchers and software engineers benefit from real in-depth knowledge of Arm assembly and reverse engineering. This book takes you step-by-step on your path to reading programs compiled for Arm processors using dynamic and static analysis, and how to write your own Arm assembly code in both 32-bit and 64-bit.

Learn how to spot security vulnerabilities in programs compiled for Arm, including the vulnerability categories of stack- and heap-based buffer overflows, information leaks, integer overflows and underflows, use-after-free, double-free and invalid-free vulnerabilities, and how they are exploited.

See how operating system, processor, and compiler designers defend against memory-corruption exploits using exploit mitigations like Address Space Layout Randomization, Execute Never, Stack Canaries and Pointer Authentication. Find out how to use them in your own programs to make them more secure, and learn the techniques hackers have developed to circumvent these anti-exploit features.

Arm Assembly

Learn the fundamentals of the Arm architecture and familiarize yourself with both Arm 32-bit and 64-bit Assembly.

Static Analysis

Learn program flow patterns and how to use free tools to reverse engineer binaries compiled for Arm processors.

Dynamic Analysis

Learn how to debug Arm binaries and processes to trigger and analyze real-world vulnerabilities.

Vulnerability Discovery

Learn about different types of vulnerabilities and how to identify them through reverse engineering.

Exploit Mitigations

Get an in-depth understanding on how exploit mitigations work and how they make exploitation more difficult.

Mitigation Bypasses

Learn the techniques hackers use to bypass exloit mitigations with hands-on exploit engineering examples.

The Authors

Harry Jones
Maria Markstedter
Founder and CEO, Azeria Labs

Maria is the founder and CEO of Azeria Labs, offering services and trainings at top-tier security conferences including Black Hat and Infiltrate, as well as on-site private training for large tech companies and consulting law enforcement agencies. She holds a Bachelor’s degree in Corporate and IT Security and a Master’s degree in Enterprise and IT Security. In 2018, Maria became a Forbes “30 under 30” list member for technology and has been featured in Vogue Business Magazine. She is a member of both the Black Hat® EU and US Trainings and Briefings Review Board.

Her research focus is on Mobile and IoT reverse engineering and binary exploitation, as well as exploit mitigations and bypasses. Maria worked on exploit mitigation research alongside Arm in Cambridge and continues to educate security researchers and developers around the world on attacking and defending Arm binary applications.

Adam Jones
Matt Tait
Partner at Azeria Labs

Matt is a Partner at Azeria Labs focusing on exploit development and security research. He previously worked as an offensive-exploit developer for the UK government at GCHQ, as a defensive security researcher at Google Project Zero, iSec Partners, and NGS Secure, primarily on operating system and device security, including as a security consultant at Microsoft, Amazon and Samsung.

Matt also has an extensive national security background. He has taught cybersecurity at the University of Texas at Austin, where he was also a senior fellow at the Strauss Center for International Security and Law. In the US he has testified before the House Intelligence Committee, Senate Select Committee for Intelligence and Senate Judiciary Committee on various issues surrounding cybersecurity and intelligence issues, and in the UK, provided testimony to the Independent Reviewer of Terrorism Legislation during the passage of the Investigatory Powers Act.

Subscribe for Updates

Sign up to get the latest developments on this book, new blogs, and online training releases delivered straight to your inbox.