Sogou Write your own operating system - classic books

Assembly language, written in Wang Shuang. Teacher Wang Shuang this book is absolutely classic, many other than the introduction to the compilation of the language of the book is strong. The book runs through the whole book. Unlike other books, a bunch of instructions. This book only describes the common commands, and each instruction has an example, so that you completely understand the assembly language. Yourself to write the operating system, written in the yuan. People will ask why not an operating system implementation. Indeed an operating system is to achieve their own hands to write the operating system upgrade version. I see the process...
read(3129) comment(4)

IDA dynamic debugging DEX Android file

0x00 us to Ali first as an example, dynamic debugging DEX file. Reference Android dynamic debugging DEX IDA file a text, first of all AndroidManifest.xml inside the true android:debuggable=". The following 0x01 detailed steps. 1, will classes.dex into IDA. , options->Set specific 2 Debugger->Debugger...
read(246) comment(1)

Native Android anti debugging methods and the use of IDA to bypass the anti debugging

0x00 in order to avoid the nonsense of the whole file is dynamic analysis, we usually in so join anti debugging code, anti common Android native debugging method are the following. 1, directly call ptrace (PTRACE_TRACEME, 0, 0, 0), Android Native anti debugging. 2, according to the above said /proc/$pid/status TracerPid row to display the debug program PID principle, can write a method for checking.
read(347) comment(1)

Ida dynamic debugging so, init_array and JNI_ONLOAD at the next breakpoint

0x00 how the JNI JNI_ONLOAD breakpoint, Android reference reverse learning notes (5) - in the JNI JNI_Onload function breakpoints to avoid for IDA Pro anti debugging. It is best to use the simulator debugging, to ensure Attach to process after the corresponding process in DDMS red spider. Under the how in the array init breakpoint, first of all to find so array init end, so was dragged into the IDA, then press Crtl+s, all segments of the nonsense of the whole. As follows...
read(303) comment(1)

DexHunter analysis of shelling artifact

0x00 this article we analyze the Android shell artifact DexHunter source code. DexHunter is also the author to write an article on it from the perspective of Android operation, build our shelling artifact. DexHunter source code is located in https://github.com/zyq8709/DexHunter. 0x01 DexHunter implementation, only need to modify a file: dalvik\vm\native\dalvik_sy...
read(631) comment(1)

Run time dynamic repair Dex

0x00 in this paper, we first separated...
read(436) comment(3)

DexClassLoader and PathClassLoader class loading mechanism

0x00 in DexClassLoader and PathClassLoader loading DEX process, we analysis the DEX file how to form the DexFile structure. In this paper, to explain the class loading mechanism, in fact, is to generate ClassObject objects. We take DexClassLoader as an example, to explain the class loading mechanism, PathClassLoader is the same. In our class loading is usually called loadClass, then we went from loadClas...
read(810) comment(0)

DexClassLoader and PathClassLoader load Dex process

0x00 in an article on the article APK installation and optimization principle. At last we analyze the different DexClassLoader PathClassLoader constructor. PathClassLoader ends with a call to the new DexFile pathFile and DexClassLoader call is DexFile.loadDex (dexPathList[i], outputName, 0). 0x01...
read(518) comment(0)

Apk installation and optimization principle

0x00 APK installation: 1, boot installation 2, by ADB install or in the mobile phone click APK, interface is installed. 0x01 boot in server system call PackageManagerService.main, with deepening of the call, cycle of every APK calls scanPackageLI method. This function extraction apk androidmanifest.xml.
read(542) comment(0)

Android shell native

In this case only run through the Android2.3 virtual machine, if adapted to other models, please, just call here. 0x00 in Android APK reinforcement (packers) analysis of principle and realization, the shell code are written in the Java layer readily identifiable and needs a lot of need the shelled program transferred to the native layer, transfer of ideas is very actually simple also is in the native layer by layer JNI call java code. 0x01 public class Prox...
read(623) comment(2)

Analysis of Android packers principle

0x00 reading this article before, readers are advised to first read Android packers principle and reference in the Android APK reinforcement (packers) analysis of principle and realization. If you have not read this article, this article is more difficult to understand. Below the 0x01 us to analyze the shell code why should we write this, core shell code in the ProxyApplication, first executive members of the method attachBaseContext, and executive member of the oncreate method. Then attach...
read(412) comment(0)

Android security jourrney review blog

Summarize the learning experience of nearly one year, with the Chinese new year as the node. Time from 2015 to today, the end of 2015. 1, re learning the again to the Linux kernel source code scenario analysis on volumes, Maud parade with, and record the learning process and wrote the blog. 2, re learning the again to the Android source code scenario analysis ", Luo Shengyang with, and record from start to the home screen shows the entire process. 3, learning a small java virtual machine source code, debug and modify the source code in error, finally can run...
read(552) comment(2)

Android static analysis smail

The previous article Android static analysis SmalI, I have been in consideration of the following several problems: 1, sub class, the use of the parent class method, then corresponding smail is invoke-super invoke-virtual? Corresponds to the class is the parent or child class it? Explain: invoke-direct {p0}, Landroid/app/Activity; (- >) V, here said the superclass or subclass refers to is invoke parameter followed by the class in this example.
read(527) comment(0)

Android system startup process

We first look at a map, it clearly illustrates the entire Android system startup process, reference Android kernel development: graphical Android system startup process. In the first stage: Android devices after power, first from the processor on-chip ROM boot boot code starts to execute, the on-chip ROM will find bootloader code, and loaded into memory. (this step by the chip manufacturer is responsible for the design and implementation of) second stage: bootloader starts executing, first is responsible for the completion of the hardware initialization.
read(701) comment(1)

Start of Home interface

After the Launcher process starts, we continue to analyze the Home interface to start. Final class ActivityThread public { ...... Static final void main (args String[]) {public SamplingProfilerIntegration.start (); Process.setArgV0 (""); Loope...
read(639) comment(2)

Start of Launcher process

Following the start process of the System process in the second part, we analyze the start of Launcher process. Class Process public { ...... Static final int start public (String processClass final, String niceName final, Uid int, GID int[], GIDS int, DebugFl int...
read(745) comment(0)
274 data a total of 19 pagesOne Two Three Four Five ... Next page Shadowe
    personal data
    • visit216424 times
    • Integral:Five thousand one hundred and sixty-eight
    • Grade
    • Rank:2903rd name
    • original275
    • Reproduced:0
    • Translation:1
    • Comments:92
    Latest comments