Instead, I’m going all the way back to the initial purpose of JTAG, which was a way to toggle bits on a board as part of automated testing. I’m talking about JTAG-that ubiquitous interface that most often comes up as a way to debug devices, and, from a security perspective, is a giant bullseye an attacker will use to read memory and code out of your device.Īll that said, this article isn’t even about the usage of JTAG as a debug interface. But in this article, I’m coming back to something older-something that’s even a year older than me-and that some of you may have used years ago and forgotten about. In many of my articles I try to bring you some of the most recent embedded security work from the past few years.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |