Hardware Reverse-Engineering
Revision as of 09:21, 13 October 2016 by <bdi>PhilippeTeuwen</bdi> (talk | contribs)
Some resources...
JTAG
tutos/posts
- JTAG Explained (finally!): Why "IoT", Software Security Engineers, and Manufacturers Should Care
- ZooBaB page with several JTAG-related projects
projects
- Tjtag-arduino Use the arduino as a JTAG adaptor with Tjtag
- Arduiggler Arduino based JTAG cable with UrJTAG
- JTAGduino The JTAGduino project has the goal of using Arduino as a JTAG interface
- FUJI Free USB JTAG interface
- JTAGenum (Arduino-based) scans pins for basic JTAG functionality and can be used to enumerate the IR for undocumented opcodes
- JTAGulator open source hardware tool that assists in identifying OCD connections from test points, vias, or component pads on a target device
- jtag-finder mirror
- Black Magic Probe in-application debugging tool using a JTAG or Serial Wire Debugging (SWD) port. Targets ARM Cortex-M and Cortex-A based microcontrollers.
EEPROM extraction
- Demystifying Hardware Security Part I, Part II, Part III
- Practical Reverse Engineering (Huawei HG533 router)
Firmware extraction, glitch way
- scanlime:015 / Glitchy Descriptor Firmware Grab (video) using chipwhisperer
After firmware extraction
- Reversing and Exploiting Embedded Devices: The Software Stack Part I
SCA/FI
- ChipWhisperer
- wiki & tutos