Skip to content
  • PRODUCTS + CAPABILITIES
    • FIRMWARE HARDENING
    • RUNTIME PROTECTION
    • RUNTIME MONITORING
    • SECURITY CONSULTING
    • FPGA SECURITY
    • AUTOMATED HARDWARE REVERSING
  • INDUSTRY SOLUTIONS
    • INDUSTRIAL + BMS
    • ELECTRICAL GRID
    • AUTOMOTIVE
    • DEFENSE + AEROSPACE
    • UAS HARDENING
  • RESOURCES
    • CASE STUDIES
    • PUBLICATIONS
    • PRESS RELEASES
    • RESEARCH
    • NEWS
  • COMPANY
    • ABOUT
    • CAREERS
    • CONTACT
  • BLOG
  • PRODUCTS + CAPABILITIES
    • FIRMWARE HARDENING
    • RUNTIME PROTECTION
    • RUNTIME MONITORING
    • SECURITY CONSULTING
    • FPGA SECURITY
    • AUTOMATED HARDWARE REVERSING
  • INDUSTRY SOLUTIONS
    • INDUSTRIAL + BMS
    • ELECTRICAL GRID
    • AUTOMOTIVE
    • DEFENSE + AEROSPACE
    • UAS HARDENING
  • RESOURCES
    • CASE STUDIES
    • PUBLICATIONS
    • PRESS RELEASES
    • RESEARCH
    • NEWS
  • COMPANY
    • ABOUT
    • CAREERS
    • CONTACT
  • BLOG
CONTACT
  • PRODUCTS + CAPABILITIES
    • FIRMWARE HARDENING
    • RUNTIME PROTECTION
    • RUNTIME MONITORING
    • SECURITY CONSULTING
    • FPGA SECURITY
    • AUTOMATED HARDWARE REVERSING
  • INDUSTRY SOLUTIONS
    • INDUSTRIAL + BMS
    • ELECTRICAL GRID
    • AUTOMOTIVE
    • DEFENSE + AEROSPACE
    • UAS HARDENING
  • RESOURCES
    • CASE STUDIES
    • PUBLICATIONS
    • PRESS RELEASES
    • RESEARCH
    • NEWS
  • COMPANY
    • ABOUT
    • CAREERS
    • CONTACT
  • BLOG
  • PRODUCTS + CAPABILITIES
    • FIRMWARE HARDENING
    • RUNTIME PROTECTION
    • RUNTIME MONITORING
    • SECURITY CONSULTING
    • FPGA SECURITY
    • AUTOMATED HARDWARE REVERSING
  • INDUSTRY SOLUTIONS
    • INDUSTRIAL + BMS
    • ELECTRICAL GRID
    • AUTOMOTIVE
    • DEFENSE + AEROSPACE
    • UAS HARDENING
  • RESOURCES
    • CASE STUDIES
    • PUBLICATIONS
    • PRESS RELEASES
    • RESEARCH
    • NEWS
  • COMPANY
    • ABOUT
    • CAREERS
    • CONTACT
  • BLOG

Hacking Randomized Linux Kernel Images at the DEF CON 33 Car Hacking Village

Disassembly view highlighting CodeRegion 0x402000–0x402028 and ELF section .shellcode during firmware analysis.

Red Balloon Security’s DEF CON 33 Car Hacking Village CTF write-up: unpacking firmware, cracking a repeating-key XOR, and exploiting a buffer overflow on ARM64 to ROP into mprotect() and execute shellcode—despite randomized Linux syscall numbers.

Hacking Secure Software Update Systems at the DEF CON 32 Car Hacking Village

Read about Red Balloon’s CTF at DEF CON 32’s Car Hacking Village, highlighting secure software updates.

  • PRODUCTS + CAPABILITIES
    • FIRMWARE HARDENING
    • RUNTIME PROTECTION
    • RUNTIME MONITORING
    • SECURITY CONSULTING
    • FPGA SECURITY
    • AUTOMATED HARDWARE REVERSING
  • INDUSTRY SOLUTIONS
    • INDUSTRIAL + BMS
    • ELECTRICAL GRID
    • AUTOMOTIVE
    • DEFENSE + AEROSPACE
    • UAS HARDENING
  • RESOURCES
    • CASE STUDIES
    • PUBLICATIONS
    • PRESS RELEASES
    • RESEARCH
    • NEWS
  • COMPANY
    • ABOUT
    • CAREERS
    • CONTACT
  • BLOG
  • PRODUCTS + CAPABILITIES
    • FIRMWARE HARDENING
    • RUNTIME PROTECTION
    • RUNTIME MONITORING
    • SECURITY CONSULTING
    • FPGA SECURITY
    • AUTOMATED HARDWARE REVERSING
  • INDUSTRY SOLUTIONS
    • INDUSTRIAL + BMS
    • ELECTRICAL GRID
    • AUTOMOTIVE
    • DEFENSE + AEROSPACE
    • UAS HARDENING
  • RESOURCES
    • CASE STUDIES
    • PUBLICATIONS
    • PRESS RELEASES
    • RESEARCH
    • NEWS
  • COMPANY
    • ABOUT
    • CAREERS
    • CONTACT
  • BLOG

© 2025 Red Balloon Security.

All Rights Reserved.

Privacy Policy

Icon-linkedin Icon-twitter

[email protected]

Sal Stolfo was an original founding member of Red Balloon Security, Inc.

Secure Your Embedded Systems with Industry-Leading Expertise

Contact us to learn more about our advanced embedded security solutions or schedule a demonstration with our experts.

✅ Submission received. We'll be in touch shortly.