Главная
Study mode:
on
1
Intro
2
What is JTAG
3
What is cool about JTAG
4
What is interesting about JTAG
5
Fun slide
6
Architecture
7
Data Registers
8
State Machine
9
Instructions
10
Protection
11
Software Tools
12
ID Code Scan
13
Device ID
14
Bypass Scan
15
Timing with ID Code
16
Demo
17
LinksysWRT54G
18
Samsung
19
CplD
20
Samsung SCHI
21
JTAG Demonstration
22
UART Spec
23
TX RX
24
Asynchronous Data
25
The Scan
26
UART Scan Example
27
Speed
28
UARTs
29
Rootshell
30
USB to Serial
31
Limitations
32
Future Work
33
Where to Get Information
34
Questions
Description:
Explore advanced techniques for discovering debug interfaces using the JTAGulator in this 43-minute Black Hat conference talk. Delve into the intricacies of JTAG, including its architecture, data registers, state machine, and instructions. Learn about software tools for ID code scanning, device identification, and bypass scanning. Witness practical demonstrations using various devices like Linksys WRT54G and Samsung products. Gain insights into UART specifications, asynchronous data transmission, and UART scanning techniques. Discover the limitations of current methods and potential future developments in the field. Acquire valuable resources for further information and engage in a Q&A session to deepen your understanding of debug interface discovery.

Discovering Debug Interfaces with the JTAGulator Part 2

Black Hat
Add to list