Video: Blackbox JTAG Reverse Engineering

Posted on Saturday, July 27th, 2013 in JTAG, reversed, Videos by the machinegeek

Felix Domke has been working on reverse engineering blackbox devices using the JTAG interface and presented this talk at the 26C3 Chaos Communications Congress conference.

JTAG is an industry standard for accessing testmode functionality in almost any complex microchip. While the basics of JTAG are standardized, the exact implementation details are usually undocumented. Nevertheless, JTAG often allows you to interact with the chip very deeply, which makes it very interesting since it is often easily accessible thanks to the small pincount. This talk covers reverse engineering of JTAG interfaces when no or only limited documentation is available.

The short PDF paper accompanying this presentation is available from the Chaos Communication Congress. [Note: the documentation for the reference to the “JTAG Finder” program in the paper’s footnote has been moved here.]

This entry was posted on Saturday, July 27th, 2013 at 12:01 am and is filed under JTAG, reversed, Videos. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

2 Responses to “Video: Blackbox JTAG Reverse Engineering”

  1. Sjaak says:

    coincidently dave of eevblog posted about the workings of jtag:

  2. Srikanth Ala says:

    This Video is Really Awsome..

    We are designing our own JTAG, So, I think It will Help Us.

    Thank You.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • Kurt: It's quality that counts, not quantity: a fly lays more eggs than a hen.
  • Wilyb: Never got one
  • Dan: Free is always good. Nice boards too.
  • Dan: Free is always good.
  • KH: I think no plague. Both failed capacitors are on the same side. Look at the backplane, it's likely the failed caps were on the left...