The speaker discusses their open source tools and techniques for processor security, including a tool called the Collector which automates the reverse engineering of deeply embedded instruction sets.
- Speaker has open sourced tools, techniques, code, and data for processor security
- Collector tool automates reverse engineering of deeply embedded instruction sets
- Collector identifies basic patterns in state differential records and classifies instructions based on those patterns
- Collector resolves individual bits in instructions and derives bit encoding for specific instructions
- Speaker wrote a complete assembler for custom assembly language called the Dice Assembler
The Collector tool is able to automatically derive a bit encoding for specific instructions by identifying patterns in state differential records. The speaker used this tool to build a payload for a deeply embedded core, which included instructions to load the global descriptor table, move data around, load immediate values, and read/write data to memory. They then wrote a complete assembler for this custom assembly language called the Dice Assembler.