Author Topic: JTAG Reverse Engineering  (Read 1306 times)

0 Members and 1 Guest are viewing this topic.

Offline legacy

  • Super Contributor
  • ***
  • Posts: 3834
  • Country: ch
JTAG Reverse Engineering
« on: December 20, 2015, 10:00:35 am »
I was discussing with a friend about reversing an fpga-board which comes with an unknown .ucf, and he claimed that the .ucf can be determined without desoldering anything.
His argumentation is based on this article!
if someone has some skill with optical fibre channel, please contact me in private! Thanks!
 

Online ataradov

  • Super Contributor
  • ***
  • Posts: 5459
  • Country: us
    • Personal site
Re: JTAG Reverse Engineering
« Reply #1 on: December 20, 2015, 10:32:56 am »
The tool mentioned in the article can detect connections between multiple JTAG-enabled devices on the same board. It basically uses standard boundary scan.

It will have very limited (or none at all) usability for a board with a single FPGA. It will also not detect connections for LEDs, switches, and other external components.
Alex
 


Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo
Smf