IoT Firmware Reverse Engineering [DRAFT]

In this beginner-friendly training, you'll look into the firmware of an IoT device and take it apart! The training introduces the fundamentals of analyzing embedded firmware using the Raspberry Pi Pico 2 W as a target platform. You will explore how compiled firmware looks compared to source code, and how to extract meaningful information from it.

Through a series of hands-on exercises, you will analyze, flash, debug, and emulate firmware. Along the way, you will uncover hidden functionality and flags, gaining practical insight into both static and dynamic analysis techniques for IoT devices.

This training teaches the essential methods and tools required to analyze embedded firmware, providing a foundation for IoT security research and hardware-oriented reverse engineering.

Trainer

Jiska Classen is a wireless and mobile security researcher, leading a research group at Hasso Plattner Institute. The intersection of her research topics means that she digs into iOS internals, reverse engineers wireless firmware, and analyzes proprietary protocols. Her research includes the security analysis of widely deployed IoT devices such as Fitbit fitness trackers, Apple AirTags, and Neato vacuum cleaning robots.

She has previously spoken at Black Hat USA, DEF CON, RECon, Hardwear.io, Chaos Communication Congress, Chaos Communication Camp, Gulasch Programmer Nacht, MRMCDs, Easterhegg, Troopers, Pass the Salt, NotPinkCon, gave various lectures and training, and published at prestigious academic venues. Jiska Classen gave iOS and Android security trainings at TROOPERS, Nullcon, RE//verse, Countermeasure, and Objective by the Sea, and has teaching experience from creating own lectures and labs in academic settings.

Venue

This training will take place June 24, 2026 on-site at TROOPERS 2026 in Heidelberg.

Booking

As a BlackHoodie training, dedicated to women, this 1-day IoT training is free for all attendees! Furthermore, full-time students can apply for a free TROOPERS conference ticket. For further details, see the BlackHoodie website.

Topic Overview

Training Prerequisites

What to Bring

Who should attend?

This training is aimed at anyone interested in firmware and IoT security, including up and coming pen testers, security or vulnerability researchers, or IoT device developers.


OffensiveCon 2026 (Germany) · RE//verse 2026 (US) · CounterMeasure (Canada) · home