SYNCSRC Verifiably Insecure

Jtagsploitation at 44con 2015

An overview of five methods for how to turn JTAG access into privileged software access on a system. Each method is general enough to be broadly applicable across different hardware architectures and implementations.

44con presentation of Jtagsploitation

Jtagsploitation at Github