CW port mapping on its pins

I was wondering if there is a spec-sheet for CWLITE’s port mapping. I am pretty sure these ports are mostly GPIO ports but I wonder each’s functionality with the target boards, espeically which port handles what functions when we doing the lab tutorials.

If this seems too much, I wonder mostly two functions here:

  1. What are the pins that were used for UART TX and RX with the victim target
  2. What is the pin trigger for the trigger signal. I wonder on the CWLITE which pin was used to detect that signal

If there’s a spec sheet would be greater. I got this board from my professor who does not know how to use it neither. So I do not have a spec-sheet along with it. I am using CWLITE with XMEGA target.

Follow up, I tried to upload a picture but I was unable to. So to illustrate my point, I drew a high-level sketch of the layout. pins, total of 20, the right side parts.


Measure Glitch


x x x x x x x x x x
x x x x x x x x x x

We include these stickers showing the 20-pin connector definitions with our ChipWhisperers (maybe you didn’t get one?)
IO1-4 are general-purpose IOs, usually used for UART and triggering; HS1-2 are used for clocks. will tell you what each is set to; scope.trigger will tell you which is the trigger.

Our Jupyter tutorials will teach you all this.

Thanks for your reply that’s really helpful! Yeah unfortunately when I received the device from my advisor I do not have this pin map with my device. I also wonder how do I read this. Does the first column first row +5V correspond to my pin map I drew above first row first column [0][0] position and I read it vertically?

In addition I am currently at ScA lab 2 password checking tutorial. I wonder which lab gives me the detail of this internal mechanic so I can view that for information


It corresponds to this view, i.e. ground on top right and bottom left of picture.

There is no single lab which teaches you everything about CW. Instead, each lab teaches you a little bit about how to use CW and a little bit about side-channel attacks at the same time. If you work your way through everything, then you’ll get the complete picture.

For the rest there’s the documentation here and here.