Remix.run Logo
ralusek 6 hours ago

What is the most reliable place for ROMs these days? Is there any sort of checksum that can accompany them to ensure safety? While I trust Dolphin, I don't trust most ROMs.

joenot443 5 hours ago | parent | next [-]

In all my years of emulation, I've never come across a malicious ROM for a major console.

Dolphin runs its own VM. Obviously anything is possible, but developing some kind of breakout-ROM which would infect the host machine is just way more engineering than I could imagine ever being worth it. The vector is just too complex, and the target (nerds downloading retro games) just isn't worth the squeeze.

Archive.org actually hosts a good chunk of the major Gamecube ROMs. Good luck!

0x0 3 hours ago | parent [-]

The breakout engineering to exploit Dolphin has already happened, see for example:

* https://dougallj.wordpress.com/2016/11/13/exploiting-dolphin...

* https://gist.github.com/hthh/502ae16db55612f64d3966769a154c3...

* https://github.com/dolphin-emu/dolphin/pull/4447

mfjordvald 5 hours ago | parent | prev | next [-]

There's tons of options, no-intro, redump, tosec, mame are all doing DAT files with file checksums.

That said, ROMs are basically never a malware vector as they have to exploit an issue in the emulators themselves and historically that hasn't really been seen. Typically malware related to roms happens with files included in the zip archives or by sites offering "downloaders" with embedded malware.

anthk an hour ago | parent [-]

gstreamer, 6502 code from a NES music decoder, and maybe c64 SIDs would exploit it too.

zeta0134 5 hours ago | parent | prev | next [-]

I've had pretty good success with CleanRip https://wiibrew.org/wiki/CleanRip#Wii_DAT_download for acquiring ROM files. With it, I was able to backup my entire personal collection with minimal fuss, and can now enjoy that collection in HD with Dolphin's various enhancements.

For verification you generally want the Redump database, which has checksums for most disc-based console releases. Unfortunately they seem to be offline at the moment, or I'd share a canonical link. Look around for that.

lmz 5 hours ago | parent | prev [-]

Now there's an interesting challenge. A ROM that does a VM breakout and runs a command on the host.

jsheard 5 hours ago | parent [-]

It's been done, the ZSNES and Project64 emulators have both had exploits which allowed a malicious ROM to run arbitrary code on the host. ZSNES is written mostly in assembly so that was kinda asking for trouble though.