BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.pass-the-salt.org//pts2026//speaker//TLLPZL
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-pts2026-NRFUKL@cfp.pass-the-salt.org
DTSTART;TZID=CET:20260630T161000
DTEND;TZID=CET:20260630T164500
DESCRIPTION:With the increased scrutiny on embedded device security\, firmw
 are encryption is rapidly becoming a standard hurdle in the analysis pipel
 ine. As vendors increasingly attempt to lock down their systems\, we're en
 countering a growing variety of encryption schemes applied at different la
 yers—ranging from full firmware blobs to kernel images and root file sys
 tems.\n\nThis talk dives deep into the landscape of firmware encryption as
  seen in the wild\, drawing from real-world targets such as telco routers\
 , firewalls\, IP cameras\, printers\, and IP phones. We'll explore encrypt
 ion schemes implemented across Linux and BSD derivatives\, with decryption
  logic buried in bootloaders\, kernel code\, or even opaque self-update bi
 naries.\n\nRather than just showcasing results\, this session is built as 
 a reversing adventure: starting with an opaque encrypted blob\, we’ll tr
 ace a path through static and dynamic reverse engineering to uncover the d
 ecryption primitive and ultimately access the firmware's inner workings. W
 e'll analyze the recurring patterns\, common developer pitfalls\, and the 
 surprising creativity some vendors bring to the table.\n\nWhether you're b
 uilding firmware extraction pipelines or you're just in it for the puzzles
 \, this talk will arm you with practical techniques and insights for takin
 g back control of encrypted firmware.
DTSTAMP:20260514T103036Z
LOCATION:Amphitheater 122
SUMMARY:__Salty Firmware - Adventures in Firmware Encryption Reversing - Qu
 entin Kaiser
URL:https://cfp.pass-the-salt.org/pts2026/talk/NRFUKL/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-pts2026-TZJESW@cfp.pass-the-salt.org
DTSTART;TZID=CET:20260701T141500
DTEND;TZID=CET:20260701T170000
DESCRIPTION:Join us for this hands-on demo of [Unblob](https://unblob.org/)
 \, the flexible firmware extractor. In this session\, we will extract firm
 ware from an EV charger\, dig into the firmware\, and eventually emulate i
 t so we can interact with the services in real-time. Unblob works on both 
 hardware and downloadable versions of firmware so we have a target rich en
 vironment.
DTSTAMP:20260514T103036Z
LOCATION:Room LW112
SUMMARY:Hands-on Firmware Extraction\, Exploration\, and Emulation - Quenti
 n Kaiser
URL:https://cfp.pass-the-salt.org/pts2026/talk/TZJESW/
END:VEVENT
END:VCALENDAR
