I’m actually using a chipwhisperer capture rev 2 and I want to make an attack on the Virtex-6 FPGA of the ML605 board. I can’t get more recent chipwhisperer hardware that include FPGA in their target, I also can’t get a sasebo or a sakura. I’m stuck with the capture rev 2.
So, I want to have some advices on how should I proceed to do that. Maybe analysing the schematics of the sasebo to see how the FPGA il connected to the simple serial 20 pin connector, or get the Verilog project of the simple serial protocol that communicates with the python side. I should also understand to manipulateur the trigger. Should I need to make my own PCB ?
This board uses package pins to communicate with chipwhisiperer, so you can use standard “SimpleSerlial” target in CW.
All code is available here, including verilog files and UCF file and schematics:
So first you need to port that project to your board/FPGA.
Then find pins that you can use for communication. You only need 4 pins, but 1 has to be a clock pin.
And finally connect everything and configure FPGA.
In the Chipwhiserer Capture Software, in Projects -> Example Scripts, there is few example scripts. Each one in specific to a chipwhisperer model.
For example there is ( Chipwhisperer-Lite: AES SimpleSerial on XMEGA, SAKURA-G: AES-128 FPGA Target, …, and Chipwhisperer-Rev2: SimpleSerial Target).
Which one did you use to capture your traces ? Or Maybe you coded your own Python Script ? Can I use Chipwhisperer-Rev2: SimpleSerial Target ? because I’m using the Capture Rev2.