Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Liberating Bluetooth on the ESP32

media.ccc.de via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the reverse engineering of the ESP32's proprietary Bluetooth stack in this 34-minute conference talk from 39C3. Dive into the low-level workings of Espressif's closed-source Bluetooth subsystem, which remains largely undocumented despite powering millions of devices in the hacker and maker communities. Learn about the systematic reverse engineering process used to document the Bluetooth peripheral, including techniques for peripheral mapping, navigating broken memory references, and symbol name recovery. Discover the internal architecture of the Bluetooth peripheral, its memory regions, interrupts, and related components through detailed analysis. Examine the tools and methodologies developed to simplify the reverse engineering process, including SVD files and open documentation aimed at empowering researchers and developers. Understand how this work enables the creation of custom Bluetooth stacks, security auditing of existing implementations, and novel repurposing of ESP32 hardware for specialized applications. Gain insights into Bluetooth security research, hardware reverse engineering techniques, and the importance of transparency in embedded systems development.

Syllabus

39C3 - Liberating Bluetooth on the ESP32

Taught by

media.ccc.de

Reviews

Start your review of Liberating Bluetooth on the ESP32

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.