Remove embedded emmc chips from devices for analysis!Come by the VXRL chip-off village and learn how to remove embedded eMMC chips for your own analysis. VXRL members will also teach you how to attack IoT/mobile devices to obtain privileges and gain access controls. In addition, some inexpensive JTAG/ISP and chip-off equipment will be made available for your testing and eMMC chips with circuit board kits will be made available for practice.

Chip-off Exercises

Participants will be provided with a damaged USB thumbdrive that is embedded with a BGA Chip.  You will be guided on how to remove the chip from the drive using IR Rework Station, and then recover the data from the chip. You will also be encouraged to try and learn more things from the chip.  Embedded is a mobile phone file system.  Once you successful retrieved the data from the chip, there will be a few questions to answer.  Questions may include password cracking, C2 server, wallet and stego.

SMD Advanced Soldering Exercise

Test your eyesight with this exact exercise! Participants will be provided with an SMD badge and some very, very small (1 mm) integrated circuitry and LEDs to solder. This may take up to an hour to complete for newbies, faster for those experienced with soldering. But it makes for good practice and is a rewarding challenge, as participants who succeed will get to learn how to use the soldering tools properly even on making a tiny devices.

Experts from VXRL will demonstrate how to attack the IoT/mobile devices  to obtain privilege and gain access control as well as the data stored.  We will also introduce some inexpensive JTAG/ISP and chip-off equipments (even made in China) on-site and for your testing.

Agenda (tentative)

9 & 10 May
Time Village
10:00 – 10:15 Chip off Briefing Session
10:15 – 12:15 Chip-Off Exercises / Challenge
12:30 – 14:30 SMD Advanced Soldering Exercises
14:45 – 15:00 Chip-off Briefing session
15:00 – 17:00 Chip-Off Exercises / Challenge

Village Organisers


Captain is the founder of Chip-off Village. It had been held in the different security conference like HITB AMS and Defcon China, and the coming Hardware Security Conference in The Hague and HITB Dubai. He has also delivered chip-off forensics analysis training in HTCIA US, HITCON and CodeBlue security conference.


Anthony Lai focus on offensive “Kungfu”, malware analysis, target attack research as well as attribution. He is passionate over Capture the Flag game, reverse engineering and exploitation for years. Anthony found VXRL since 2009 and he is Blackhat Asia and HITB CFP review board members, speaking at Blackhat USA and DEFCON on malware analysis, APT and DDoS attack techniques.

Sponsored by