Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Bare Metal Reverse Engineering - ARM Cortex Embedded Firmware Analysis

DEFCONConference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn a practical methodology for reverse engineering real-time embedded firmware built on ARM Cortex platforms in this 22-minute conference talk. Master the use of Ghidra as the primary analysis environment to facilitate collaboration while reconstructing the core layers of embedded systems for deep operational insights. Discover how to map the Board Support Package (BSP) using the SVD loader plugin to associate memory-mapped registers with hardware peripherals. Analyze the Hardware Abstraction Layer (HAL) through custom type recovery and function pattern matching to identify initialization routines and peripheral control logic. Apply Ghidra's BSim plugin at the RTOS level to detect task creation, scheduler logic, and inter-process communication constructs used in FreeRTOS and similar kernels. Gain a structured approach to reversing embedded C/C++ applications even when symbols are stripped and source code is unavailable, enabling confident dissection of the layered architecture of constrained, real-time embedded systems for firmware analysts, security researchers, and engineers.

Syllabus

DEF CON 33 - Bare Metal Reverse Engineering - SolaSec

Taught by

DEFCONConference

Reviews

Start your review of Bare Metal Reverse Engineering - ARM Cortex Embedded Firmware Analysis

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.