RTOS Reverse Engineering

4 Day u_long 32 CPE Hour Training: January 2021

FEB 2-7 [click for important details]

Abstract

This training will teach students how to analyze real time operating systems deployments. The training will focus on concepts from open source operating systems, where the most context is available, then transition the lessons learned to closed source third-party deployments with an emphasis on VxWorks based products.

The training will focus predominately on the ARM architecture with cameos from others as circumstances allow.

Students will learn about challenges solved by forward engineering teams and use that information to make informed conclusions when reversing.

Students will learn about security technology in embedded products including Cryptographic Security Modules (CSMs) and Memory Protection Units (MPUs).

The course is primarily hands-on-keyboard exercises rather than lecturing, but will introduce diagrams and theory as needed. The entire class will regularly sync up as a group to discuss concepts, problems, and solutions.

Course Topics

Real Time Operating System Concepts

with examples from:

Forward Development Concepts

  • Embedded development life-cycle
  • Chip capabilities and selection
  • Memory management

QEMU

  • Emulating "full" computer systems
  • Debugging and run-time introspection
  • Challenges associated with "re-hosting" deployments found in the wild

Reverse Engineering Challenges

  • Separating operating system code from application code
  • Data reconstruction
  • Reversing unknown APIs
  • Automatically identifying standard library functions
  • Static identification of ABIs

Tooling

  • Writing Loader and Analyzer plugins for Ghidra to create a more familiar analysis environment and accelerate reverse engineering.

Prerequisites

Students are expected to have experience programming in C or C++, and basic knowledge of the Linux command line. Prior experience with reverse-engineering is nice to have, but not required.

System Requirements

Computer capable of running a virtual machine. Recommended minimum 16GB RAM with quad-core processor. VMWare or VirtualBox to run a Linux VM (all exercises will be in the Linux VM)

Evan Jensen

Evan Jensen

Register Now

Evan Jensen (@jensensec) is the co-founder and CTO of the Boston Cybernetics Institute (BCI), where he splits his time between performing security assessments, developing capabilities, and teaching. Evan has conducted training workshops on reversing and exploitation at many universities, including BU, RPI, NYU, MIT, Tufts, and West Point. He has also presented and taught at hacker conferences including ShmooCon, REcon, Ringzer0, and Hack in the Box. Before co-founding BCI, Evan worked in the Cyber System Assessments Group at MIT Lincoln Laboratory and on Facebook's redteam. He has a BS in computer science from NYU Tandon School of Engineering.