Reversing an M32C Firmware - Lessons Learned from Playing with an Uncommon Architecture
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore the intricacies of reversing firmware on an unfamiliar architecture in this 25-minute conference talk from Recon 2022. Delve into the journey of tackling an M32C firmware from a medical device, focusing on the approach and lessons learned rather than specific device details. Gain insights into handling unknown embedded architectures, including interrupt handlers, special purpose registers, and flash handling code. Examine low-level microcontroller concepts and M32C assembly, providing valuable pointers for hardware hackers venturing beyond Linux-based systems. Learn from Philippe Laulheret, a Senior Security Researcher at Trellix, as he shares his experience and expertise in reverse engineering and vulnerability research on complex systems.
Syllabus
Recon 2022 - Reversing an M32C firmware Lesson learned from playing with an uncommon architecture
Taught by
Recon Conference
Related Courses
Harnessing Intel Processor Trace on Windows for FuzzRecon Conference via YouTube Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube