27C3: Building Custom Disassemblers

FX of Phenoelit recently presented a talk at the 27C3 CCC in Berlin, Germany on the topic of instruction set reverse engineering. Topics include obtaining byte code, analyzing it for basic properties, finding addressing modes, and implementing an IDA Pro processor module. The primary focus is on the transformation of byte code back into mnemonic […]

27C3: File – Print – Electronics

In this presentation from the 27C3 conference held recently in Berlin, Germany, Jeff Gough demonstrates the next step in hardware development, the circuit board printer. As an alternative to dependence on prefab dev boards and kits, Jeff outlines his efforts in reverse engineering an Epson inkjet printer to build a rapid prototyping machine for circuit […]

27C3: Embedded Reverse Engineering Tools and Techniques

Nathan Fain and Vadik presented at the 27C3 Chaos Communications Congress held recently in Berlin, Germany, on a topic of interest to us all: JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques. Check out their webpage for full documentation and analysis.

Running your own GSM stack on a phone

Harald Welte and Steve Markgraf presented at 27C3 CCC in Berlin, Germany, on the OsmocomBB project, a Free Software implementation of the GSM protocol stack running on a mobile phone. This provides the security researcher a tool equivalent to an Ethernet card in the TCP/IP protocol world: a simple transceiver that will send arbitrary protocol […]

Reverse engineering a real-world RFID payment system

Harald Welte presented at the 27C3 CCC in Berlin, Germany, demonstrating his efforts at reverse engineering the data format of a real-world RFID based debit card system. His efforts focused on the EasyCard system, which is a popular method of cashless payment in Asia. Slides of the presentation are also available.

27C3: Reverse engineering the MOS 6502

The MOS 6502 CPU, which was designed in 1975 and powered systems like the Apple II, the Atari 2600, the Nintendo NES and the Commodore 64 for two decades, has always been subject to intense reverse engineering of its inner workings. This talk by Michael Steil presents the way from a chip package to a […]