Tag: reverse-engineering

60 articles
Date Tue 10 December 2019
Authors Alexandre Adamski, Joffrey Guilbon, Maxime Peterlin
Category Reverse-Engineering

In this first article of a series of three, we will give a tour of the different components of Samsung's TrustZone, explain how they work and how they interact with each other.

Date Tue 26 November 2019
Author Romain Thomas
Category Android

Analysis of Tencent Legu: a packer for Android applications.

Date Thu 24 October 2019
Author Elouan Appere
Category Reverse-Engineering

Qualcomm is the market-dominant hardware vendor for non-Apple smartphones. Considering the [SoCs] they produce are predominant, it has become increasingly interesting to reverse-engineer and take over their boot chain in order to get a hold onto the highest-privileged components while they are executing. Ultimately, the objective is to be able to experiment with closed-source and/or undocumented components such as hardware registers or Trusted Execution Environment Software.

Date Tue 24 September 2019
Authors Robin David, Alexis Challande
Category Program Analysis

This blog post presents a comparison between various disassembled binary exporters.

Date Tue 16 April 2019
Author Hugues Anguelkov
Category Reverse-Engineering

Broadcom is one of the major vendors of wireless devices worldwide. Since these chips are so widespread they constitute a high value target to attackers and any vulnerability found in them should be considered to pose high risk. In this blog post I provide an account of my internship at Quarkslab which included obtaining, reversing and fuzzing the firmware, and finding a few new vulnerabilities.

Date Wed 27 March 2019
Author Romain Thomas
Category Android

This blog post is about techniques to disable Android runtime restrictions


NotPetya [0] is a variant of the Petya ransomware [1] that appeared in June 2017 in Ukraine. These malwares have the particularity to rewrite the MBR of computers that are still using an old fashioned BIOS-based booting system. This MBR encrypts the Master File Table (MFT) of the underlying NTFS partition systems.

Date Mon 11 February 2019
Author Nahuel Riva
Category Hardware

Second part of a blog post series about our approach to reverse engineer a Philips TriMedia based IP camera.

Date Tue 22 January 2019
Author Nahuel Riva
Category Hardware

First part of a blog post series about our approach to reverse engineer a Philips TriMedia based IP camera.

Date Thu 25 October 2018
Author Gwaby
Category Reverse-Engineering

This blogpost briefly presents the Windows Notification Facility and provides a write-up for a nice exercise that was given by Bruce Dang during his workshop at Recon Montreal 2018.