Gain a Splash of New Skills - Coursera+ Annual Just ₹7,999
Free AI-powered learning to build in-demand skills
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the reverse engineering of the ESP32's proprietary Bluetooth stack in this 34-minute conference talk from 39C3. Dive into the low-level workings of Espressif's closed-source Bluetooth subsystem, which remains largely undocumented despite powering millions of devices in the hacker and maker communities. Learn about the systematic reverse engineering process used to document the Bluetooth peripheral, including techniques for peripheral mapping, navigating broken memory references, and symbol name recovery. Discover the internal architecture of the Bluetooth peripheral, its memory regions, interrupts, and related components through detailed analysis. Examine the tools and methodologies developed to simplify the reverse engineering process, including SVD files and open documentation aimed at empowering researchers and developers. Understand how this work enables the creation of custom Bluetooth stacks, security auditing of existing implementations, and novel repurposing of ESP32 hardware for specialized applications. Gain insights into Bluetooth security research, hardware reverse engineering techniques, and the importance of transparency in embedded systems development.
Syllabus
39C3 - Liberating Bluetooth on the ESP32
Taught by
media.ccc.de