The first module annotates Cortex M vector tables, which gives IDA Pro hints about where code exists in the firmware image. The IDAPython code is comprised of two modules. During the course of this research, I developed code for IDA Pro to assist in loading and grooming Cortex M firmware images. This paper focuses on the disassembly of this firmware, and the discussion of a novel approach to defeating readback protection discovered in one ARM Cortex M implementation. This paper describes a methodology for retrieving device firmware, and for loading firmware into IDA Pro, a common disassembler. The paper is entitled "Examining Personal Protection Devices – Hardware & Firmware Research Methodology in Action"Įxamining Personal Protection Devices: Hardware and Firmware Research Methodology in Action I'm proud to release my first blog post, paper, and code repository since joining Duo Security.
0 Comments
Leave a Reply. |