Video: Blackbox JTAG Reverse Engineering

Posted on Saturday, July 27th, 2013 in JTAG, reversed, Videos by the machinegeek

Felix Domke has been working on reverse engineering blackbox devices using the JTAG interface and presented this talk at the 26C3 Chaos Communications Congress conference.

JTAG is an industry standard for accessing testmode functionality in almost any complex microchip. While the basics of JTAG are standardized, the exact implementation details are usually undocumented. Nevertheless, JTAG often allows you to interact with the chip very deeply, which makes it very interesting since it is often easily accessible thanks to the small pincount. This talk covers reverse engineering of JTAG interfaces when no or only limited documentation is available.

The short PDF paper accompanying this presentation is available from the Chaos Communication Congress. [Note: the documentation for the reference to the “JTAG Finder” program in the paper’s footnote has been moved here.]

This entry was posted on Saturday, July 27th, 2013 at 12:01 am and is filed under JTAG, reversed, Videos. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

2 Responses to “Video: Blackbox JTAG Reverse Engineering”

  1. Sjaak says:

    coincidently dave of eevblog posted about the workings of jtag:

  2. Srikanth Ala says:

    This Video is Really Awsome..

    We are designing our own JTAG, So, I think It will Help Us.

    Thank You.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • Daniel: Looks like someone made an order with Arrow. ;)
  • Paul Robertson: Count me in
  • Chris Jennings: I too like the cold and snow (it means no grass mowing). Now I can focus on fun stuff like hobby boards and woodworking.
  • flubba86: Commenting for fun and profit.
  • Sohan: If wishes were PCBs, beggars would be soldering!