How to Dump, Parse, and Analyze i.MX Flash Memory Chips
Hack In The Box Security Conference via YouTube
Overview
Explore the intricacies of analyzing NXP i.MX architecture flash memory in this conference talk from the Hack In The Box Security Conference. Delve into the challenges of recovering filesystems from i.MX6 device memory dumps and learn about the custom flash memory management specific to this platform. Discover the speaker's journey in developing tools to parse and analyze i.MX6 flash memory dumps, enabling the extraction of complete filesystems for security assessment. Gain insights into the i.MX architecture, its flash memory layouts, and unique features such as spare area usage, block storage mechanisms, and partition variations. Learn how to extract valuable information from these memory dumps and explore the newly developed open-source tools presented for handling this specific memory layout.
Syllabus
#HITB2019AMS D1T3 - How To Dump, Parse, And Analyze i.MX Flash Memory Chips - Damien Cauquil
Taught by
Hack In The Box Security Conference