lecture: Nifty Tricks for ARM Firmware Reverse Engineering
This fast-paced lecture will share with you some nifty tricks for reverse engineering ARM and Thumb embedded systems. You will learn techniques for dumping firmware from locked chips, as well as how to identify specific functions within the extracted binary blob. I'll also explain how to port identified symbols from one firmware version to another, and how to quickly emulate the firmware in Linux for convenient re-use and debugging.
All techniques work on practical targets, and specific examples from the real-world will be used wherever possible.
Start time: 20:30