Tags: bytecode rev vm 

Rating:

`bubble-vm` was a simple VM reverse engineering challenge with only two pointers: an instruction pointer, and a data pointer.
This author writeup goes over how the VM's instruction set was used to design higher-level program abstractions, resulting in the creation of a 10k-bytecode flag verifier program, featuring function calls, iteration, and recursion.

Original writeup (https://cor.team/posts/corctf-2025-bubble-vm/).