A Journey into Advanced Theoretical Reverse Engineering
Black Hat Asia 2025 · Day 1 · Briefings
In this compelling Black Hat Asia presentation, Alisa Sage, founder of Zero Day Engineering, unveiled the intricate and previously opaque world of Qualcomm's **QDSP6 JTAG** and its proprietary **In-Silicon Debugger (ISDB)**. The talk, titled "Unveiling the Mysteries of Qualcomm's QDSP6 JTAG, a Journey into Advanced Theoretical Reverse Engineering," addressed a critical gap in security research: the severe lack of low-level debugging capabilities for Qualcomm's ubiquitous Hexagon architecture. This architecture, a custom Digital Signal Processor (DSP), powers the Snapdragon system-on-chips (SoCs) found in approximately 30% of the global mobile smartphone market, as well as increasingly in laptops.
AI review
Alisa Sage's research into Qualcomm's QDSP6 JTAG and ISDB is a monumental piece of theoretical reverse engineering. By meticulously piecing together fragments from patents, kernel code, and manuals, she's provided the first public blueprint for understanding how debugging is controlled on the Hexagon architecture. This isn't just academic curiosity; it's foundational work that unlocks the ability for serious researchers to audit the most opaque, yet critical, components of modern mobile devices, laying the groundwork for future vulnerability discovery and defensive innovation.