Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Building Custom Disassemblers

Type
Video
Tags
PLC, reverse engineering
Authors
Felix 'FX' Lindner
Event
Confidence 2011 Krakow
Indexed on
May 21, 2013
URL
http://data.proidea.org.pl/confidence/9edycja/materialy/video/Felix_Lindner.mp4
File name
Felix_Lindner.mp4
File size
463.0 MB
MD5
e328356fcc47ea27fc238bbe9d6458bf
SHA1
5007791436ca87e1fb400efe9897dadbdc870259

The Reverse Engineer occasionally faces situations where even his most advanced commercial tools do not support the instruction set of an arcane CPU. To overcome this situation, one can develop the missing disassembler. This talk is meant to be a tutorial on how to approach the task, what to focus on first and what surprises one may be in for. The primary focus will be on the transformation of byte code back into mnemonic representation where only the reverse transformation is available (i.e. you have the respective assembler). It also covers how to integrate your new disassembler into your reverse engineering tool chain.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !