Ripple20- Reverse Engineering Archeology
On September 8th, 2020, JSOF’s security researchers Shlomi Oberman, Moshe Kol and Ariel Schön presented the talk “Reverse Engineering Archeology: Multiple Devices, Multiple Versions” at the CONfidence 2020 infosec conference.
CONFidence is an international infosecurity conference originated in 2005 in Poland. The September 2020 edition has been the 19th edition of CONFidence.
JSOF’s session focused on the original research process used to identify and pinpoint the Ripple20 vulnerabilities, their variants, and some attempts to piece together the historical timeline showing how the original software library changed over time.
This was a complex process of reverse engineering multiple devices simultaneously (7 in total!), working in parallel on many different levels.
In this session we described how we reverse engineered the devices simultaneously, using comparative techniques to confirm each point. We explained an interesting outcome of the supply chain ripple effect, and how it is now possible to find a vulnerability affecting hundreds of devices for near zero effort.
The full presentation is available for download.
Want to see us in action, explaining the entire process? Join one of our future (virtual) sessions.
- CONFidence 2020 ONLINE: Reverse Engineering Archeology, September 8, 3:30pm, Track 2
- CODE BLUE 2020 @Tokyo: October 29-30, 2020, exact session slot not yet scheduled
- GreHack 2020: November 20, 2020, exact session slot not yet scheduled
Get the full Reverse Engineering Archeology presentation HERE