Ringzer0 BOOTSTRAP25 Austin

Willem Melching

Willem Melching (https://twitter.com/PD0WM) is an independent security researcher. He has over 7 years of experience working on automotive security and reverse engineering. During his time at comma.ai he worked an aftermarket ADAS device and providing open source tools to help the community reverse and interact with a wide variety of cars. Check out his blog (https://icanhack.nl/blog) for recent work.


What is your Linked In URL?

https://www.linkedin.com/in/willem-melching-54a2982b/

What is your Twitter/X Handle?

https://x.com/PD0WM


Session

03-22
13:15
90min
WORKSHOP: Introduction to Automotive firmware reverse engineering
Willem Melching

In this workshop we will cover the basics of reverse engineering automotive firmware. An ECU firmware can consist of millions of lines of code which would take a long time to fully reverse engineer. Tips and tricks will be taught to quickly identify parts of the firmware that are of interest.

TCC📍Room 1.124