Black box reverse engineering for unknown/custom instruction sets

Presented at REcon 2016, June 17, 2016, 11:30 a.m. (30 minutes).

Have you ever come across a firmware image for which you couldn’t find a disassembler? This talk will cover reverse-engineering techniques for extracting an instruction encoding from a raw binary with an unknown/custom instruction set. The main focus is on static techniques and features of firmware images that you can use to your advantage–but some dynamic techniques will be covered as well.


Presenters:

Links:

Similar Presentations: