View Single Post
  #7  
Old 08-03-2010, 04:48
new_profile new_profile is offline
VIP
 
Join Date: Aug 2002
Posts: 148
Rept. Given: 27
Rept. Rcvd 7 Times in 7 Posts
Thanks Given: 43
Thanks Rcvd at 42 Times in 19 Posts
new_profile Reputation: 7
Quote:
Originally Posted by minux View Post
Yeah, maybe we could open a new forum discussing embedded hacking?

Deeply-embedded software these days doesn't use any anti- method.
But, I'm quite interested in it. (After all, their code is in flash, and ARM is a RISC.
And RAM is limited.)
Time ago, I've integrated a library for DVB descrambling running on an ARM based processor. All names and strings are obfuscated (even thread names) and it add many anti-debugging tricks like RDTSC equivalent instruction. I've tried debugging it remotely using a gdb client but it always detect my debugging session.
On the other side, I've worked on projects (embedded linux) where companies linked their executable against libraries with debug symbols included (not stripped and with -g or -ggdb flags activated) and they are not aware of the security risk.

Cheers
Reply With Quote