All Questions
3
questions
0
votes
0
answers
80
views
Why does Intel's CCA (USB3 JTAG control scheme) not let a remote attacker own any system with a flash drive plugged in?
JTAG lets us read / write the architecture states on a CPU core. Intel's CCA let's us connect to JTAG with a USB3 port. So why could an attacker not execute code to trick a flash drive plugged into a ...
3
votes
3
answers
939
views
What security risks does the Test Access Port (TAP) introduce?
Trying to get my head around the JTAG world I looked at how the Test Access Port (TAP) works and although I get why we need it, the diagram seemed to me (as a software developer) introducing some kind ...
7
votes
2
answers
3k
views
Is there a way to prevent code being read from an MSP430 without blowing the fuse?
I was recently involved at a project in a small company where we had fears of someone taking the code from the master chip, an MSP430F2419, and using it for a competing product. We ended up blowing ...