Firmware Reverse-Engineering Using NSA Software Continues

Written by Michael Larabel in Coreboot on 11 June 2019 at 09:07 AM EDT. 6 Comments
COREBOOT
Earlier this month we reported on a new Google Summer of Code project making use of NSA software to help with firmware reverse engineering. So far that effort seems to be paying off of using Ghidra.

Ghidra is the US National Security Agency's open-source project designed to assist in reverse engineering. Ghidra is similar to IDA Pro and other decompilers/disassemblers. The focus of the GSoC 2019 project has been integrating the support to make it suitable as a tool to help with firmware reverse-engineering.

Student developer Alex James has continued making progress in being able to load x86 / UEFI option ROMs. The effort currently underway is on the file-system loader for the components used for Coreboot firmware images followed by Intel flash images and UEFI firmware volumes.

More details on the current work can be found via the Coreboot Git.
Related News
About The Author
Michael Larabel

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 20,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter, LinkedIn, or contacted via MichaelLarabel.com.

Popular News This Week