Workshop: Fuzz Testing Bare Metal and RTOS Firmware

TOBIAS SCHARNOWSKI

Abstract

Fuzz testing is a powerful technique for uncovering vulnerabilities, but applying it to deeply embedded, bare-metal, or real-time operating system (RTOS) firmware presents unique challenges compared to traditional Linux-based systems. This hands-on, 90-minute workshop will guide participants through the process of analyzing and fuzz testing deeply embedded firmware using a modern technique called firmware rehosting.

Workshop Outline

Attendees will gain practical experience in:

  1. Understanding the Landscape: We will explore the differences between deeply embedded firmware and Linux-based firmware.
  2. Firmware Analysis with Ghidra: Participants will learn how to load and start analyzing deeply embedded firmware in Ghidra.
  3. Fuzz Testing with Fuzzware: We will introduce Fuzzware, a rehosting-based fuzzing framework for deeply embedded systems, and demonstrate how to set up and execute fuzz tests to uncover security issues.

This workshop is ideal for security researchers, embedded developers, and anyone interested in securing low-level firmware. No prior experience is required. Attendees will leave with the knowledge and practical skills needed to start integrating fuzz testing into their embedded security workflows.

Tobias and Marius' BOOTSTRAP25 Training

All trainings come with complimentary access to our BOOTSTRAP25 event! Book a virtual or in-person trainings and get a taste of the others at BOOTSTRAP25!

Fuzzing and Attacking Custom Embedded Systems
This training covers analyzing, fuzz testing, and exploiting devices with custom embedded OS. It dives into Arm Firmware, teaches reverse engineering with Ghidra, and offers hands-on exercises to build proficiency with tools like Unicorn, AFL++, and Fuzzware.

In-Person Training | March 18-21

Tobias Scharnowski

Tobias Scharnowski is an embedded systems security researcher at CISPA. He focuses on automated firmware security analysis techniques. Besides academia, he is a CTF RE/pwning veteran and repeat Pwn2Own participant. At Pwn2Own, he demonstrated RCE on 13 targets in the automotive and industrial automation domains. This included an exploit of the core DNP3 implementation, the protocol that powers the US electric grid.

Great! Next, complete checkout for full access to Ringzer0
Welcome back! You've successfully signed in
You've successfully subscribed to Ringzer0
Success! Your account is fully activated, you now have access to all content
Success! Your billing info has been updated
Your billing was not updated