Article ID Journal Published Year Pages File Type
458363 Digital Investigation 2006 11 Pages PDF
Abstract

This paper describes how to use JTAG (JTAG: Joint Test Action Group, also called boundary-scan) for producing a forensic image (image: an one-on-one copy of data found on an exhibit) of an embedded system. A JTAG test access port is normally used for testing printed circuit boards or for debugging embedded software. The method described in this paper uses a JTAG test access port to access memory chips directly. By accessing memory chips directly, the risk of changing data in the exhibit is minimized. Also user level passwords can be omitted.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
,