May 15 10:00 AM EDT
Workshops are first-come, first-serve and have limited capacity. Some workshops may be streamed for additional passive participation.
Ever wanted to make a CPU says Hello world? Or figure how a driver to communicate with hardware? Or how to reverse engineer a bootloader? Then this workshop is for you.
The ultimate goal of this workshop is to make participants understand how they could emulate and debug binaries which runs directly on a CPU, without an underlying operating system. Good examples of such binaries are bootloaders and the kernel of the operating system itself.
To this end, this workshop propose the following:
- Install a cross compiler toolchain and compile the Qemu emulator from source code.
- Try code samples with our compiled Qemu
- Modify these samples to make them work on different machine types
- Solve CTF challenge with static and dynamic analysis of a more complex binary using Qemu's debugging capabilities.
Marc-André Labonté ,
Marc-andre Labonte was a system administrator for more than a decade at the McGill Genome Center while it was known as the McGill University and Genome Quebec Innovation Center. There, he took part in the design, deployment, operation and maintenance of the data center as it went through multiple upgrade cycles to accommodate ever powerful high throughput genome sequencers coming to market.
Then, he joined the ETTIC team at Desjardins in 2016 as infrastructure penetration tester. Currently doing vulnerability research on IOT devices, he also presented "Automated contact tracing experiment on ESP Vroom32" workshop at NSEC in 2021. His work is motivated by curiosity and a strong sense of personal privacy in a world of connected devices and data hungry organizations.