653Device hacking with JTAG

Speakers
Peter De Schrijver
Language german
Room Saal 3
Time Day 2, 16:00h
Duration 1 hour
Links
[1] Links on the Dlink DI614+ hack:
[2] http://seattlewireless.net/index.cgi/SamSung4510
[3] Links on opensource JTAG tools and dongle designs
[4] http://lapwww.epfl.ch/dev/arm/jelie/
[5] http://www.lart.tudelft.nl/projects/jtag/
[6] http://bh.udev.org/filez/wireless/samsung4510/pasteleurs/jtag-samsung4510-ver0.2.pdf

Description

TAG is a standardized interface originally defined for testing purposes. It allows controling all external signal pins of a chip using a serial protocol. This allows for board level tests and initial programming of flash ROMs for example. Most complex chips (such as CPUs, FPGAs, CPLDs etc) have this interface. Some CPU manufacturers added hardware assisted debugging support via the JTAG interface.

As JTAG is widely used these days, the necessary electrical connections for the JTAG interface are available on most of the currently sold electronic devices. This opens interesting possibilities for hacking these devices. This talk will start with a short introduction on JTAG basics and then proceed on showing how the JTAG interface can be used with some simple hardware and opensource tools to hack existing devices. As an example I will use the work we did on the Dlink DI614+ wireless router. I will end my talk by giving some directions for future development on tools and techniques.

Archived page - Impressum/Datenschutz