User:Whiteknight/x86 Disassembly
This page is an outline for a proposed book or project. This is only a planning page, not an actual book.
(Whiteknight) (Discuss) (Book Foundry) (Current Books) (VBD Edit)
- Do not add sub-pages to this outline.
- Any user may edit this outline, but Whiteknight maintains complete editorial control on this page.
- This page may be deleted without warning.
This outline was last edited on 7 January 2008. Last edit over 202 months ago. Please update.
This book is going to contain sections specific to x86, C, and C++ from the Reverse Engineering book.
The Plan
edit- Target Audience
- Undergraduate students familiar with x86 and C/C++ programming
- Scope
- Will cover disassembly of x86 code to C or C++ level, including theory on disassembly and decompiling.
- Prerequisites
- x86 Assembly, C Programming, C++ Programming
- Corequisites
- None.
Preface
editTable of Contents
editTools
edit- Assemblers and Compilers
- Decompilers and Disassemblers
- Analysis Tools
Platforms
edit- Microsoft Windows
- Windows Executable Files
- Linux
- Linux Executable Files
Code Patterns
edit- The Stack
- Functions and Stack Frames
- Calling Conventions
- Variables
- Data Structures
- Objects and Classes
- Branches
- Loops
- Floating Point Numbers
Difficulties
edit- Code Optimizations
- Code Obfuscation
- Code Encryption
- Debugger Detectors
Decompiler Theory
edit- Disassembler Theory
- Decompiler Theory
Resources
editExisting Pages
editOutline (20080102162450)
edit+Reading level|Undergraduate &x86 Assembly &C Programming &C++ Programming = Tools Assemblers and Compilers Decompilers and Disassemblers Analysis Tools = Platforms Microsoft Windows Windows Executable Files Linux Linux Executable Files = Code Patterns The Stack Functions and Stack Frames Calling Conventions Variables Data Structures Objects and Classes Branches Loops Floating Point Numbers = Difficulties Code Optimizations Code Obfuscation Code Encryption Debugger Detectors = Decompiler Theory Disassembler Theory Decompiler Theory