An Example of PCB Reverse Engineering - Reconstruction of Digilent JTAG SMT3 Schematic
暂无分享,去创建一个
This paper presents a successful reverse engineering process of Digilent JTAG-SMT3-NC module, revealing the identity of all key components. The reconstruction required a deep knowledge of PCB (Printed Circuit Board) design and manufacturing process and knowledge of (elementary) function principles and behavior of the examined device. We were able to reveal 80% of schematic via analysis of publicly available resources such as original high-resolution images and BOM (Bill of Material) fragments. The remaining 20% were obtained by non-invasive test equipment such as multi-meter and microscope. The reconstructed schematic has been verified by designing our own PCB implementing the original SMT3 function.
[1] S. Scotchmer,et al. The Law and Economics of Reverse Engineering , 2002 .
[2] Christof Paar,et al. Hardware reverse engineering: Overview and open challenges , 2017, 2017 IEEE 2nd International Verification and Security Workshop (IVSW).
[3] R. Elizabeth. Center for the Study of Law and Society Jurisprudence and Social Policy Program , 2007 .