GET /congress/2025/event/c553ee23-bc27-585a-b8d0-d8fee999e75a/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": "c553ee23-bc27-585a-b8d0-d8fee999e75a",
    "kind": "official",
    "name": "Reverse engineering the Pixel TitanM2 firmware",
    "slug": "reverse-engineering-the-pixel-titanm2-firmware",
    "url": "https://api.events.ccc.de/congress/2025/event/c553ee23-bc27-585a-b8d0-d8fee999e75a/?format=api",
    "track": "hardware",
    "assembly": "ccc",
    "room": "7202df07-050c-552f-8318-992f94e40ef0",
    "location": null,
    "language": "en",
    "description": "I will discuss the problems encountered while reverse engineering and simulating the firmware for the TitanM2 security chip, found in the Google Pixel phones. I'll discuss how to obtain the firmware. Talk about the problems reverse engineering this particular binary. I show how you can easily extend ghidra with new instructions to get a full decompilation. Also, I wrote a Risc-V simulator in python for running the titanM2 firmware.",
    "schedule_start": "2025-12-28T23:55:00+01:00",
    "schedule_duration": "00:40:00",
    "schedule_end": "2025-12-29T00:35:00+01:00"
}