Skip to main content

The JTAG Interface: An Attacker's Perspective

December 07, 2016

The JTAG interface, while originally designed for engineers performing low-level system testing, is also widely abused by reverse-engineers and malicious threat actors in order to compromise the security of embedded or “IoT” devices. In this paper, we take the attacker’s perspective and explore the JTAG interface from the ground up.


Stay in the Know

For all the latest cyber security and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Privacy Policy

Stay Connected

Find cyber security Events in your area.