Difference between revisions of "Hardware Reverse-Engineering"
Jump to navigation
Jump to search
m |
m |
||
Line 30: | Line 30: | ||
* [https://newae.com/tools/chipwhisperer/ ChipWhisperer] |
* [https://newae.com/tools/chipwhisperer/ ChipWhisperer] |
||
** [https://wiki.newae.com/Main_Page wiki] & tutos |
** [https://wiki.newae.com/Main_Page wiki] & tutos |
||
+ | |||
+ | =Don't's== |
||
+ | * https://www.reddit.com/r/funny/comments/49dayl/shortly_after_these_stock_photos_were_taken_all/ |
Revision as of 12:50, 5 October 2016
Some resources...
JTAG
tutos/posts
- JTAG Explained (finally!): Why "IoT", Software Security Engineers, and Manufacturers Should Care
- ZooBaB page with several JTAG-related projects
projects
- Tjtag-arduino Use the arduino as a JTAG adaptor with Tjtag
- Arduiggler Arduino based JTAG cable with UrJTAG
- JTAGduino The JTAGduino project has the goal of using Arduino as a JTAG interface
- FUJI Free USB JTAG interface
- JTAGenum (Arduino-based) scans pins for basic JTAG functionality and can be used to enumerate the IR for undocumented opcodes
- JTAGulator open source hardware tool that assists in identifying OCD connections from test points, vias, or component pads on a target device
- jtag-finder mirror
- Black Magic Probe in-application debugging tool using a JTAG or Serial Wire Debugging (SWD) port. Targets ARM Cortex-M and Cortex-A based microcontrollers.
EEPROM extraction
- Demystifying Hardware Security Part I, Part II, Part III
- Practical Reverse Engineering (Huawei HG533 router)
Firmware extraction, glitch way
- scanlime:015 / Glitchy Descriptor Firmware Grab (video) using chipwhisperer
After firmware extraction
- Reversing and Exploiting Embedded Devices: The Software Stack Part I
SCA/FI
- ChipWhisperer
- wiki & tutos