- 10 June, 2022
- by Benjamin Kollenda
Most modern microcontrollers take measures to protect the contained software. As we have shown previously these protections are not perfect and can be bypassed.
Most modern microcontrollers take measures to protect the contained software. As we have shown previously these protections are not perfect and can be bypassed.
This article is a repost. It was originally published at Tim Blazytko’s personal blog: https://synthesis.to/2021/08/10/obfuscation_detection.html. In a previous blog post, we already discussed that it is valuable to know which code areas are obfuscated; those areas often guard sensitive code and are worth a closer look.
Most modern microntrollers allow customers to protect their valuable code and data against unauthorized access using a feature called Readout Protection (ROP).
This article is a repost. It was originally published at Tim Blazytko’s personal blog: https://synthesis.to/2021/03/15/control_flow_analysis.html. Following my last blog post, I got a lot of questions about additional material on control-flow analysis.
This article is a repost. It was originally published at Tim Blazytko’s personal blog: https://synthesis.to/2021/03/03/flattening_detection.html. Commercial businesses and malware authors often use code obfuscation to protect specific code areas to impede reverse engineering.