Quote:
Originally Posted by minux
Yeah, maybe we could open a new forum discussing embedded hacking?
Deeply-embedded software these days doesn't use any anti- method.
But, I'm quite interested in it. (After all, their code is in flash, and ARM is a RISC.
And RAM is limited.)
|
Time ago, I've integrated a library for DVB descrambling running on an ARM based processor. All names and strings are obfuscated (even thread names) and it add many anti-debugging tricks like RDTSC equivalent instruction. I've tried debugging it remotely using a gdb client but it always detect my debugging session.
On the other side, I've worked on projects (embedded linux) where companies linked their executable against libraries with debug symbols included (not stripped and with -g or -ggdb flags activated) and they are not aware of the security risk.
Cheers