AdvancedBinary AnalysisReverse EngineeringTooling

Practical Binary Analysis

Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly

5 / 5

Dennis Andriesse on the binary toolchain you can actually script: ELF internals, dynamic taint analysis, symbolic execution and instrumentation with concrete code-along examples.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2018
Publisher
No Starch Press
Pages
456
Language
English

Read this if

Reverse engineers ready to stop being IDA clickers and start being programmers who happen to RE. Andriesse covers DBI (Pin), taint analysis (Triton), and symbolic execution (angr) at exactly the level a practitioner needs to weaponize them.

Skip this if

RE beginners who haven't yet finished Practical Reverse Engineering, or readers without C and Python comfort. The book assumes you can already disassemble; the value is in the automation layer.

Key takeaways

  • Modern RE is automated RE; the book is the bridge between hand-driven analysis and the toolchain that scales to large binaries.
  • Symbolic execution is finally accessible to working RE engineers thanks to angr, and Andriesse's framing is what makes it click for most practitioners.
  • Custom DBI passes solve a category of problems that no GUI tool can; the book teaches you when to reach for them and how to write them.

Notes

Pair with Practical Reverse Engineering (Dang/Gazet/Bachaalany) for the architecture foundations and with The IDA Pro Book for the GUI workflow. Andriesse's research at VU Amsterdam and his angr-related papers are the natural follow-ups. The book assumes Linux; Windows readers can substitute Frida and DynamoRIO with minor friction.