010 - T0015! Part 0x3 - Debug Interfaces
An episode of the Unnamed Reverse Engineering Podcast podcast, hosted by Jen Costillo and Alvaro Prieto, titled "010 - T0015! Part 0x3 - Debug Interfaces" was published on May 15, 2018 and runs 35 minutes.
May 15, 2018 ·35m · Unnamed Reverse Engineering Podcast
Episode Description
This week we talk about the nebulous world of debugging interfaces, some of their history, and how they can be used in reverse engineering. We cover the basics of what are JTAG and SWD ( both ARM Debug Access Port (DAP) and ARM® Debug Interface Architecture Specification) and can they both be used to debug a MIPS processor (the answer is NO!).
We list a few other standards but also some key vendors and projects to get you debugging and controlling your next system:
- Segger J-Link/J-Trace (generally the most flexible)
- BlackMagicProbe
- ST-Link
- BusBlaster
- JTAGulator
- Cypress Miniprog3
- Microchips supports both AVR and Microchip parts for debug.
Since a few of these are from the OSHW/OSSW world, we briefly discuss the impact of this work on driving down costs and opening up the field to more people.
As always, we might have missed your favorite tool or you had questions and comments about our list, find us on twitter @unnamed_show, or email us at [email protected] and tell us.
Music by TeknoAxe (http://www.youtube.com/user/teknoaxe)
Similar Episodes
Jun 8, 2021 ·75m
Mar 11, 2021 ·0m
Feb 25, 2021 ·93m
Feb 18, 2021 ·47m
May 27, 2020 ·0m
May 23, 2020 ·1m