10.08.2015 Views

EXPLOITING EMBEDDED SYSTEMS THE SEQUEL!

Exploitation - CanSecWest

Exploitation - CanSecWest

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Debugging and Reversing• BDI2000 speaks GDB protocol• Any supported processor core can be debugged over remote gdb• gdb must be compiled for specific processor• Other embedded debuggers are mostly… badDebugging ROM code - demonstrationCopyright © 2007 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 22

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!