
This article is a repost. It was originally published at Tim Blazytko’s personal blog: https://synthesis.to/2023/08/02/api_functions.html. During my presentation “Unveiling Secrets in Binaries using Code Detection Strategies” at REcon […]
August 11, 2023

Although memory corruption vulnerabilities have been extensively studied, effective mitigation strategies are still not universally available, particularly in deeply embedded systems with constrained hardware resources, […]
July 17, 2023

Embedded system security is essential and, at the same time, complex and challenging to implement. We deliver high levels of security and IP integrity for embedded systems.
December 17, 2022

Most modern microcontrollers take measures to protect the contained software. As we have shown previously these protections are not perfect and can be bypassed.
June 10, 2022

In this article, we take a look at some generic heuristics that allow us to quickly identify interesting code parts, and how they work on (partially) obfuscated binaries.
August 10, 2021

Most modern microntrollers allow customers to protect their valuable code and data against unauthorised access using Readout Protection (ROP). This article details how it is possible to acquire the protected firmware from a properly configured device, and unlock all debugging features of the controller.
June 18, 2021

This article illustrates the theory of control-flow graph construction, dominance relations and loop analysis.
March 15, 2021

Commercial businesses and malware authors often use code obfuscation to protect specific code areas to impede reverse engineering. Knowing which code areas are obfuscated often pinpoints sensitive code parts that are worth a closer look.
March 3, 2021