View Single Post
  #7  
Old 01-07-2020, 23:37
chants chants is offline
VIP
 
Join Date: Jul 2016
Posts: 738
Rept. Given: 37
Rept. Rcvd 48 Times in 30 Posts
Thanks Given: 671
Thanks Rcvd at 1,064 Times in 482 Posts
chants Reputation: 48
I agree with everything said here. There will always be stuff to reverse. If hardware gets more and more restricted, well there are laboratories where they can use microscopic photography (though we need nanoscopic nowadays) to get chip schematics if able to shave off the 3-dimensional layers one at a time. And probably some people out there will leak schematics and there is software which can take the circuit graphs and decode units from it (such as an 8-bit adder circuit, etc). At least there should be software to aid in reversed circuit diagrams . I expect reversing in this area to explode at some point of course with assistance of those with the expensive equipment to give the raw schematic data. With state-of-the-art chips it might be impractical but it wont be impractical forever. The same photography techniques that cast the silicon dyes are probably even easier to be applied to taking pictures of chips. How to slice off the layers might be a more complex problem though. And software identification of common circuit patterns will only go so far. Certain aspects like details of caches, pipelines, core threading, etc will be quite tough to identify in an automatic manner. But this area to me is very interesting if we ever get such a dump.

I also think microcode reversing will be more common since chipmakers cannot afford to have bugs in hardware due to the expense of fixing a security vulnerability that manifests there. And the microcode can be dumped or even downloaded from updates released via the web. There can be ways to dump and reverse this microcode. Perhaps Intel ME and AMD PSP and the like can be defeated, disabled or modified for certain benefits.

Additionally the more OS kernel restrictions continue, the more there will be motivation to try to reverse them even if they are increasing tied to the hardware. I expect kernel level reversing to advance at some point.

Then with the endless server-siding of software logic and software as a service model which is becoming a matter of fact standard for money making from Windows 10 and Office 365 to games on mobile telephones, we will see more and more protocol reversing. Obviously there are lots of protocol issues and exploits where code is still run local-side due to code being excessively slow if too much communication is present or too expensive to all run on server. There is still a balance here. However, there are far more legality issues to mess with protocols. Though generally speaking abuse of protocol will just result in a permanent ban. 5G may still not be enough to totally server side everything. It gets closer, but it also makes each service more expensive. Trade-offs abound.

Finally, there is just raw mathematical advances. This is largely a driver behind protection methods. Security by obscurity is not really security or so the saying goes. So ultimately if more advanced or better cryptography methods are developed, we should expect to see them implemented in software. It can always happen, we never know when.

So summary: chip schematic reversing, microcode reversing, kernel reversing, protocol reversing are the future yet still traditional methods of reversing are going to be around for a while. There is also mathematical advances in cryptography which can throw a number of changes into the way we reverse.

A little more detailed this time around .
Reply With Quote
The Following User Says Thank You to chants For This Useful Post:
Abaddon (01-08-2020)