Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn a practical methodology for reverse engineering real-time embedded firmware built on ARM Cortex platforms in this 22-minute conference talk. Master the use of Ghidra as the primary analysis environment to facilitate collaboration while reconstructing the core layers of embedded systems for deep operational insights. Discover how to map the Board Support Package (BSP) using the SVD loader plugin to associate memory-mapped registers with hardware peripherals. Analyze the Hardware Abstraction Layer (HAL) through custom type recovery and function pattern matching to identify initialization routines and peripheral control logic. Apply Ghidra's BSim plugin at the RTOS level to detect task creation, scheduler logic, and inter-process communication constructs used in FreeRTOS and similar kernels. Gain a structured approach to reversing embedded C/C++ applications even when symbols are stripped and source code is unavailable, enabling confident dissection of the layered architecture of constrained, real-time embedded systems for firmware analysts, security researchers, and engineers.