Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced theoretical reverse engineering techniques through a detailed investigation of Qualcomm's QDSP6 JTAG debugging system in this 36-minute Black Hat conference talk. Discover how patent analysis, firmware reverse engineering, and theoretical modeling can unlock the secrets of undocumented proprietary hardware without physical access. Learn about Qualcomm's Hexagon microarchitecture, a mobile-first system distinct from ARM and RISC-V that powers critical components like cellular modems and DSPs in Snapdragon processors found in smartphones including certain iPhone models. Understand the challenges of debugging Hexagon cores, which run the proprietary QuRT real-time operating system alongside main operating systems like Android or iOS, and are severely restricted even for OEM partners. Examine the complex hardware debugging ecosystem governed by ISDB (In-Silicon Debugger), a mysterious proprietary technology layered on top of JTAG that can only be glimpsed through sparse technical specifications and obscure patents. Follow the speaker's methodology for reverse engineering ISDB purely through theoretical analysis, demonstrating how sophisticated hardware technologies can be understood without traditional hands-on approaches like hardware decapsulation or schematic analysis. Gain insights into the intersection of mobile security, proprietary debugging protocols, and advanced reverse engineering methodologies that challenge conventional hardware analysis techniques.
Syllabus
A Journey into Advanced Theoretical Reverse Engineering
Taught by
Black Hat