--- In lpc2000@yahoogroups.com, Dominic Rath <Dominic.Rath@g...> > You can't exploit this window because on ARM7TDMI-S cores the JTAG > input is synchronized with the processor clock (hence the RTCK > carrying a synchronized version of TCK). > > Dominic > Hi, Many Thanks to your feedback... If you can confirm hackers can't exploit that window, I believe the chip could be read protected properly. The others issues: - Any undocumented command, i.e. 'T' commands - JTAG boundary scans could be protected by the bootloader, as long as bootloader disables them when CRP enabled. Reverse disassembly of bootloader is of no use in hacking the chip. Regards
Message
Re: LPC Boot Loader Internals
2006-01-04 by unity0724
Attachments
- No local attachments were found for this message.