Security and Technology

Reverse Engineering USB Devices [28C3]

Reverse Engineering USB Devices [28C3] Reverse Engineering USB Devices While USB devices often use standard device classes, some do not. This talk is about reverse engineering the protocols some of these devices use, how the underlying USB protocol gives us some help, and some interesting patterns to look for. I’ll also detail the thought processes that went into reverse engineering the Kinect’s audio protocol. This talk will narrate the process of reverse engineering the Kinect audio protocol — analyzing a set of USB logs, finding patterns, building understanding, developing hypotheses of message structure, and eventually implementing a userspace driver. I’ll also cover how the USB standard can help a reverse engineer out, some common design ideas that I’ve seen, and ideas for the sorts of tools that could assist in completing this kind of task more efficiently. Speaker: Drew Fisher EventID: 4847 Event: 28th Chaos Communication Congress (28C3) by the Chaos Computer Club [CCC] Location: Berlin Congress Center [bcc]; Alexanderstr. 11; 10178 Berlin; Germany Language: english Start: 28.12.2011 14:00:00 +01:00 License: CC-by-nc-sa http://youtu.be/vS5a20kRA3M https://www.youtube.com/watch?v=vS5a20kRA3M&feature=youtu.be http://ift.tt/2aM8QhC

Deixe uma resposta

Preencha os seus dados abaixo ou clique em um ícone para log in:

Logotipo do WordPress.com

Você está comentando utilizando sua conta WordPress.com. Sair / Alterar )

Imagem do Twitter

Você está comentando utilizando sua conta Twitter. Sair / Alterar )

Foto do Facebook

Você está comentando utilizando sua conta Facebook. Sair / Alterar )

Foto do Google+

Você está comentando utilizando sua conta Google+. Sair / Alterar )

Conectando a %s