Get the latest tech news
Reverse-engineering Fujitsu M7MU RELC hardware compression
Reverse-engineering the LZSS compression used in Samsung NX mini, NX3000, Galaxy K-Zoom firmware
Applying the FAFO method (after figuring out the subsection format outlined later in this post) led to the realization that the variable-length length encoding is actually using the brute-force addition approach: When applying the decompression code right at the beginning of one of the compressed files, it falls apart pretty quickly (triggering an "accessing beyond the populated window" assertion): I initially assumed that 0x0000 is a special marker between subsections, and I needed to manually count bytes and abort the decompression before reaching it, but it turns out that it actually is just the final 0x0000 token that tells the decompressor to finish.
Or read this on Hacker News