Author Topic: JTAG Reverse Engineering  (Read 1337 times)

0 Members and 1 Guest are viewing this topic.

Offline legacy

  • Super Contributor
  • ***
  • Posts: 3940
  • Country: ch
JTAG Reverse Engineering
« on: December 19, 2015, 11:00:35 pm »
I was discussing with a friend about reversing an fpga-board which comes with an unknown .ucf, and he claimed that the .ucf can be determined without desoldering anything.
His argumentation is based on this article!

Offline ataradov

  • Super Contributor
  • ***
  • Posts: 5658
  • Country: us
    • Personal site
Re: JTAG Reverse Engineering
« Reply #1 on: December 19, 2015, 11:32:56 pm »
The tool mentioned in the article can detect connections between multiple JTAG-enabled devices on the same board. It basically uses standard boundary scan.

It will have very limited (or none at all) usability for a board with a single FPGA. It will also not detect connections for LEDs, switches, and other external components.

Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo