Skip to main content

All Questions

Tagged with
0 votes
0 answers
80 views

Why does Intel's CCA (USB3 JTAG control scheme) not let a remote attacker own any system with a flash drive plugged in?

JTAG lets us read / write the architecture states on a CPU core. Intel's CCA let's us connect to JTAG with a USB3 port. So why could an attacker not execute code to trick a flash drive plugged into a ...
J.Todd's user avatar
  • 223
3 votes
3 answers
939 views

What security risks does the Test Access Port (TAP) introduce?

Trying to get my head around the JTAG world I looked at how the Test Access Port (TAP) works and although I get why we need it, the diagram seemed to me (as a software developer) introducing some kind ...
M. A. Kishawy's user avatar
7 votes
2 answers
3k views

Is there a way to prevent code being read from an MSP430 without blowing the fuse?

I was recently involved at a project in a small company where we had fears of someone taking the code from the master chip, an MSP430F2419, and using it for a competing product. We ended up blowing ...
Dom's user avatar
  • 349