27C3: Building Custom Disassemblers

FX of Phenoelit recently presented a talk at the 27C3 CCC in Berlin, Germany on the topic of instruction set reverse engineering. Topics include obtaining byte code, analyzing it for basic properties, finding addressing modes, and implementing an IDA Pro processor module. The primary focus is on the transformation of byte code back into mnemonic representation where only the reverse transformation is available (i.e. you have the respective assembler).

The presentation is over an hour and the video is divided into seven parts. (As is sometimes the case with CCC videos, the first segment content does not begin until well into the 15 minute segment. These are volunteer produced and are being released a little over a week since the conference, so please be understanding. And just start at 14:20 in the above video.)

Leave a comment

Your email address will not be published. Required fields are marked *

Notify me of followup comments via e-mail. You can also subscribe without commenting.