Reverse Engineering MicroPython Frozen Modules

Wesley McGrew

DEF CON 32 Main Stage · Day 1 · Main Stage

This talk, presented by Wesley McGrew at DEF CON 32, delves into the often-misunderstood security implications of **MicroPython frozen modules**. While MicroPython is a lightweight implementation of Python 3 designed for resource-constrained microcontrollers, its "frozen modules" feature, intended for efficiency, is frequently misused as an obfuscation technique to hide code and secrets. McGrew's presentation meticulously outlines how to reverse engineer these modules, demonstrating that the perceived security they offer is largely illusory.

AI review

This talk by Wesley McGrew at DEF CON 32 dissects the common misconception that MicroPython frozen modules offer a security boundary. McGrew meticulously demonstrates how to reverse engineer these modules from a firmware image, even when symbolic information is stripped. The work proves that code and secrets thought to be hidden are fully recoverable, reinforcing the critical principle that obfuscation is not security and providing actionable insights for embedded developers and CTF designers.

Watch on YouTube