Continue to Site

Welcome to EDAboard.com

Welcome to our site! EDAboard.com is an international Electronics Discussion Forum focused on EDA software, circuits, schematics, books, theory, papers, asic, pld, 8051, DSP, Network, RF, Analog Design, PCB, Service Manuals... and a whole lot more! To participate you need to register. Registration is free. Click here to register now.

On reverse engineering, flash memory extraction

Status
Not open for further replies.

noiseqow

Newbie level 1
Newbie level 1
Joined
Mar 15, 2013
Messages
1
Helped
0
Reputation
0
Reaction score
0
Trophy points
1,281
Visit site
Activity points
1,290
Hi guys,

I'm doing some small reverse engineering experiments. For the past times, I always desoldered the parts I wanted to extract some info.

I've been using a Bus Pirate to accomplish this. Let's say, if I wanted to extract the contents of a SPI flash memory, do I really need to extract that component from the PCB before connecting the Bus Pirate (and the external power supply to that flash)?

It makes more sense to desolder the part imo, but I would like to know your POV, guys.

Thanks! ;- )
 

You must somehow tristate the SPI master signals. If it's a processor or FPGA, holding it in reset would usually work. Or control the lines through JTAG boundary scan.
 

The procedure might be illegal, depending on the context and national law. It can be also understood as a simple in-circuit test method, used to check the integrity of your own products. European union law permits reverse engineering under specific conditions, by the way.
 

Status
Not open for further replies.

Part and Inventory Search

Welcome to EDABoard.com

Sponsor

Back
Top