JTAG Tool Testing Jenise Reyes-Rodriguez National Institue of Standards and Technology AAFS – February 25 th, 2016.

Slides:



Advertisements
Similar presentations
A Strategy for Testing Hardware Write Block Devices James R Lyle National Institute of Standards and Technology.
Advertisements

An International Technology Roadmap for Semiconductors
Jim Lyle National Institute of Standards and Technology.
Deleted File Recovery Tool Testing Results Jim Lyle NIST 2/21/13AAFS -- Washington 1.
14 May 2010Montana Supreme Court Spring Training Conference 1 Verification of Digital Forensic Tools Jim Lyle Project Leader: Computer Forensic Tool Testing.
ABSTRACT The goal of this project was to create a more realistic and interactive appliance interface for a Usability Science class here at Union. Usability.
Programmable Logic Devices
Forensic Tool Testing Results Jim Lyle National Institute of Standards and Technology.
Federated Testing: Well-Tested Tools, Shared Test Materials & Shared Test Reports; The Computer Forensics Tool Catalog Website: Connecting Forensic Examiners.
Design and Development of High Performance PC Based Logic Analyzer MSc Project by Rab Nawaz Advisor: Dr. Shahid Masud.
TAP (Test Access Port) JTAG course June 2006 Avraham Pinto.
 IPhone came out first and had more time to develop. (3G)  Also was developed using OS-X  Android was started as a mobile device OS acquired by google.
Graphic File Carving Tool Testing Jenise Reyes-Rodriguez National Institute of Standards and Technology AAFS - February 19 th, 2015.
Mobile Device Forensics Rick Ayers. Disclaimer  Certain commercial entities, equipment, or materials may be identified in this presentation in order.
OPERATING SYSTEMS AND SYSTEMS SOFTWARE. SYSTEMS SOFTWARE Systems software consists of the programs that control the operations of the computer and its.
Mobile Device Forensics - Tool Testing Richard Ayers.
Computer Forensics Tool Catalog: Connecting Users With the Tools They Need AAFS –February 21, 2013 Ben Livelsberger NIST Information Technology Laboratory.
1 EE 587 SoC Design & Test Partha Pande School of EECS Washington State University
We make hot joints.. 2 Who we are. Originally part of a leading international handheld repair and rapid prototyping company, Repair point was formed *
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Group Members: Brad Cox Kevin Burkett Tera Cline Arthur Perkins CS10 Battery Management System.
MPE+ Access Data Evasi0n iPhone 4s/5 Nexus 4 Market Share Information.
How to discover ephemeral evidence with Live RAM analysis.
NIST CFTT: Testing Disk Imaging Tools James R. Lyle National Institute of Standards and Technology Gaithersburg Md.
Providing a Software Quality Framework for Testing of Mobile Applications Dominik Franke and Carsten Weise RWTH Achen University Embedded Software Laboratory.
RC CAR CONTROLLER BASED ON INTEL GALILEO SOC PLATFORM Nadav Shiloach Sagi Sabag Supervisor: Idan Shmuel Spring 2014 One Semester Project PROJECT’S ENDING.
The New FTC Platform (Connecting your legacy hardware)
1 Introduction to Xilinx ISL8.1i Schematic Capture and VHDL 1.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or.
1 Introduction to Xilinx ISL8.1i & 11.1 Schematic Capture 1.
A Crash Course in HARDWARE SIGMil. “Real world” hardware (analog) “Virtual world” hardware (digital)
Computer Basics Terminology - Take Notes. What is a computer? well, what is the technical definition A computer is a machine that changes information.
An Unobtrusive Debugging Methodology for Actel AX and RTAX-S FPGAs Jonathan Alexander Applications Consulting Manager Actel Corporation MAPLD 2004.
ECE 2110: Introduction to Digital Systems Introduction (Contd.)
JTAG Installation Guide (Bootloader installation) Simon Hsu.
General Computer Knowledge COE 201- Computer Proficiency.
Mastering Windows Network Forensics and Investigation Chapter 6: Live Analysis Techniques.
AccessData User Summit 2016 April 5 th – 7 th, 2016 Lake Mary, FL The Pros and Cons of JTAG and Chip Off Extractions.
NAM S.B MDLAB. Electronic Engineering, Kangwon National University 1.
Mobile Device Data Population for Tool Testing Rick Ayers.
CECS 347 Microprocessors and Controllers II Chapter 1 - An Overview of Computing Systems Instructor: Eric Hernandez.
Defining, Measuring and Mitigating Errors for Digital Forensic Tools Jim Lyle, Project Leader NIST Computer Forensics Tool Testing Feb 25, 2016AAFS - Las.
© LATTICE SEMICONDUCTOR CORPORATION 2000 Uudet mikropiirit JTAG February Lattice Confidential Lattice Semiconductor The Leader in ISP TM PLDs Presents.
How to Restore Data from Broken or Dead Samsung Galaxy S/Note? Is it possible to restore data from a damaged Samsung mobile? If your Samsung Galaxy S5's.
CAT II PRESENTATION SUBMITTED BY: SHAIK HAZI MASTAN REG.NO:13BEC0574 SUBMITTED TO: MARIA MERCY.
ECE 2110: Introduction to Digital Systems Introduction (Contd.)
SUBJECT : DIGITAL ELECTRONICS CLASS : SEM 3(B) TOPIC : INTRODUCTION OF VHDL.
CSCI206 - Computer Organization & Programming
AVR JTAG Interface The JTAG (Joint Test Action Group) development started about 1985 as a method to test populated circuit boards after manufacture. The.
Chapter 1: Computer Basics
Figure 1.1. A silicon wafer..
2. OPERATING SYSTEM 2.1 Operating System Function
An Unobtrusive Debugging Methodology for Actel AX and RTAX-S FPGAs
Tools for identifying duplicate files and known software files
AVR JTAG Interface The JTAG (Joint Test Action Group) development started about 1985 as a method to test populated circuit boards after manufacture. The.
Welcome to Salem State University
Motherboard & It’s classification.
INTRODUCTION TO MICROPROCESSORS
Changed wiring of the 555 timer
Resolve All Mozilla Firefox Errors with Best Mozilla Technical Support How to Fix Website Loading Issues after Updating Firefox?
Shipyard Machinery and Power Tool Safety
សេចក្តីផ្តើមពី Programming
Functions of an operating system
Cell Phone Analysis.
Computer Systems Key Revision Points.
This layout is for example purposes only.
Understanding Hex “I hope you have the worst headache of your life, then you will begin to understand” ~unknown.
By Anwar Campbell.
“Encryption threatens to lead all of us to a very dark place.”
Presentation transcript:

JTAG Tool Testing Jenise Reyes-Rodriguez National Institue of Standards and Technology AAFS – February 25 th, 2016

Disclaimer Certain company products may be mentioned or identified. Such identification does not imply recommendation or endorsement by the National Institute of Standards and Technology, nor does it imply that these products are necessarily the best available for the purpose.

Outline  JTAG Definition  Why test JTAG tools?  JTAG methods  Preliminary Observations  Plans for CFTT JTAG Tool Testing

What is JTAG?  JTAG = Joint Test Action Group – method for testing circuits  IEEE codified the JTAG efforts – IEEE Standard  Technique used to acquired data directly from a mobile device’s Printed Circuit Board (PCB)

Why doing JTAG?  Bypasses passwords/gesture swipes – python scripts  Data dumps from Windows Phones  Water damaged phones – mobile device repair

Importance of JTAG Tool Testing  Goal of testing: Support the admissibility of JTAG acquired  Goal for Preliminary Observations: share what we have learned so far

JTAG Requirements  Memory, Power, TAPs & Processor  processor – makes a device JTAG-able  TAPs = Test Access Ports  different: sizes, location, shapes & quantity

JTAG Cycle TAPsProcessorMemory

Are all mobile devices devices JTAG-able?  NO!  mostly applies to Android + Windows  device may not have TAPs  device not supported by JTAG tool *  processor may be supported but:  TAPs configuration has not been discovered (iOS devices)  TAPs may be disabled  TAPs shut down by OS  fuse in processor may be bad

Device not supported? – still a chance  Look for device’s processor  Is there another device using the same processor?  Use that device’s profile – known as sister phone’s profile  Probe each TAP to identify them  Hopefully connection between phone and JTAG box is established

Methods to JTAG a mobile device Soldering Method Solderless Method (ISP, eMMC chips ) Binary Dump

Soldering Method Binary Dump

Solderless Method Binary Dump

Preliminary Observations  Solderless method seems to be easier  When JTAGing a phone, tool may crash few times before it can finish the acquisition a 100%.  Acquisition speed may vary depending on the length of the wires  Acquisition speed may also vary depending on the solder points

More Observations  Solder vs Solderless method  speed  extracted data  binary compare – not hashes  Analyze and compare data acquired  Binary dumps - import data file acquired into forensic tool capable of parsing binary dumps

Still Learning…  To identify:  differences/similarities between both JTAG methods  differences between analysis tools  how to combine JTAG boxes and analysis tools

Contacts James Lyle (project leader)Rick Ayers Jenise Reyes-Rodriguez