Posts Tagged ‘JTAG’

The following is part 3 of a 6-part series detailing the examination of the security of Set-Top Boxes. The research was conducted by Om and Jack, two of our interns this past summer. Enjoy! Blog Post 3: Filesystem Extraction Background Information In our previous post we did a teardown of each board to familiarize ourselves… » Read More