197w ago - Today SKFU (linked above) is reporting that he has ran across what he believes to be an unencrypted SPU binary found in the Def Jam: Icon demo for PS3.
To quote: When I was bored yesterday I dealed with HDD decryption again and looked through the game folders on the decrypted HDD.
The Def Jam: Icon USA Demo seemed interesting as it only works on US consoles. While looking for the answer I noticed a folder dj3-ps3-opt in /USRDIR/spu/.
In there are several files like elf_sputhreads_apply.bin. I opened some files in a simple HEX editor and noticed that the files are not encrypted.
As well it looks like a binary. It does not have the default binary header used by SPU .self files compiled with the SONY PS3 SDK. It may be compiled with a third party compiler or with the IBM Cell SDK.
I did not check that, yet. Well, come back to check for updates regarding the research!
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
Well, it's still an interesting find.. if that code can be modified and 'injected' into the main application, then we could have a custom code loader through that icon... modify that icon and inject custom code.. I'm sure the file format can be reverse engineered somehow, we just need skilled people, time and a bit of luck!
I hope this can lead to something useful!
Thanks for sharing the news!
Yeah, useless we just don't know yet. If we get a hold of the decrypted main elf, then we can find out how it is loaded, and see if we can do anything "interesting" with it, but, it depends on how badly coded it is!