Get the latest tech news

Reverse-engineering Fujitsu M7MU RELC hardware compression


Reverse-engineering the LZSS compression used in Samsung NX mini, NX3000, Galaxy K-Zoom firmware

Applying the FAFO method (after figuring out the subsection format outlined later in this post) led to the realization that the variable-length length encoding is actually using the brute-force addition approach: When applying the decompression code right at the beginning of one of the compressed files, it falls apart pretty quickly (triggering an "accessing beyond the populated window" assertion): I initially assumed that 0x0000 is a special marker between subsections, and I needed to manually count bytes and abort the decompression before reaching it, but it turns out that it actually is just the final 0x0000 token that tells the decompressor to finish.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of fujitsu

fujitsu

Related news:

News photo

Fujitsu and its no public sector bids promises... what happened to them?

News photo

Fujitsu promised to sit out UK deals ... then Northern Ireland called with £125M

News photo

Fujitsu and RIKEN develop world-leading 256-qubit sup quantum computer