AI, Data Science & Business Certificates from Google, IBM & Microsoft
Learn Generative AI, Prompt Engineering, and LLMs for Free
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the reverse engineering of the ESP32's proprietary Bluetooth stack in this 34-minute conference talk from 39C3. Dive into the low-level workings of Espressif's closed-source Bluetooth subsystem, which remains largely undocumented despite powering millions of devices in the hacker and maker communities. Learn about the systematic reverse engineering process used to document the Bluetooth peripheral, including techniques for peripheral mapping, navigating broken memory references, and symbol name recovery. Discover the internal architecture of the Bluetooth peripheral, its memory regions, interrupts, and related components through detailed analysis. Examine the tools and methodologies developed to simplify the reverse engineering process, including SVD files and open documentation aimed at empowering researchers and developers. Understand how this work enables the creation of custom Bluetooth stacks, security auditing of existing implementations, and novel repurposing of ESP32 hardware for specialized applications. Gain insights into Bluetooth security research, hardware reverse engineering techniques, and the importance of transparency in embedded systems development.
Syllabus
39C3 - Liberating Bluetooth on the ESP32
Taught by
media.ccc.de