YoVDO

Reversing an M32C Firmware - Lessons Learned from Playing with an Uncommon Architecture

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Embedded Systems Courses Reverse Engineering Courses Hardware Hacking Courses

Course Description

Overview

Explore the intricacies of reversing firmware on an unfamiliar architecture in this 25-minute conference talk from Recon 2022. Delve into the journey of tackling an M32C firmware from a medical device, focusing on the approach and lessons learned rather than specific device details. Gain insights into handling unknown embedded architectures, including interrupt handlers, special purpose registers, and flash handling code. Examine low-level microcontroller concepts and M32C assembly, providing valuable pointers for hardware hackers venturing beyond Linux-based systems. Learn from Philippe Laulheret, a Senior Security Researcher at Trellix, as he shares his experience and expertise in reverse engineering and vulnerability research on complex systems.

Syllabus

Recon 2022 - Reversing an M32C firmware Lesson learned from playing with an uncommon architecture


Taught by

Recon Conference

Related Courses

Harnessing Intel Processor Trace on Windows for Fuzz
Recon Conference via YouTube
Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube
Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube
DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube
Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube