This document introduces the hardware configuration of the OpenCR board. It is a project that shares robotics technology through open source ROS between communities, academia and companies. The OpenCR board is designed as an embedded board for ROS 2.0. It uses an STM32F746 microcontroller and sensors like an accelerometer and gyroscope. The document provides details on the board's specifications, including its communication interfaces, LEDs, buttons, battery charging and block diagram. It also mentions that OpenCR can be used for the TurtleBot3 robot.
Tegra 186 (Tegra-P1 : Pascal GPU搭載のTegra)のu-bootとLinuxについて、
特に、BPMP (Boot and Power Management Processer)に関してです。
About u-boot and Linux of Tegra 186 (Tegra-P1: Tegra with Pascal GPU)
In particular, it is about BPMP (Boot and Power Management Processer).
Beginner for install Linux and *BSD in the inexpensive ARM and Intel based mo...Netwalker lab kapper
I will talk it in Taian COSCUP 2020, 8/2 15:30〜16:00 online.
Let's enjoy to install Linux for Beginner, in English
https://coscup.org/2020/zh-TW/agenda/AL73DQ
Please see it.
Thank you!
Tegra 186 (Tegra-P1 : Pascal GPU搭載のTegra)のu-bootとLinuxについて、
特に、BPMP (Boot and Power Management Processer)に関してです。
About u-boot and Linux of Tegra 186 (Tegra-P1: Tegra with Pascal GPU)
In particular, it is about BPMP (Boot and Power Management Processer).
Beginner for install Linux and *BSD in the inexpensive ARM and Intel based mo...Netwalker lab kapper
I will talk it in Taian COSCUP 2020, 8/2 15:30〜16:00 online.
Let's enjoy to install Linux for Beginner, in English
https://coscup.org/2020/zh-TW/agenda/AL73DQ
Please see it.
Thank you!
Bringing up Android on your favorite X86 Workstation or VM (AnDevCon Boston, ...Ron Munitz
My session at AnDevCon Bostong, May 2013, Boston, MA.
This class introduces the concepts of AOSP and how to use it in order to configure and build one of the most popular Android devices available: The Android emulator, for an x86 target. You will then learn a reincarnation of the AOSP, intended to bring Android to as many x86 devices as possible. You will see its structure and compare it with the AOSP, and demonstrate how such a build works within Virtual Box, QEMU and more.
LEVEL: Intermediate
TOPIC AREA: Embedded Android
For Training/Consulting requests: info@thepscg.com
Presentation at October SG Android Developer Meetup by Jeff Pang.
Jeff Pang shows us how you can build your own Android Tablet using BeagleBone and a capacitive touch screen.
BeagleBone is an $89 MSRP, credit-card-sized Linux computer that connects to the Internet and runs software such as Android 4.0 and Ubuntu. With plenty of I/O and processing power for real-time analysis provided by an AM335x 720MHz ARM® processor, BeagleBone can be complemented with cape plug-in boards to augment functionality.
Hardware backdooring is practical : slidesMoabi.com
This presentation will demonstrate that permanent backdooring of hardware is practical. We have built a generic proof of concept malware for the intel architecture, Rakshasa, capable of infecting more than a hundred of different motherboards. The first net effect of Rakshasa is to disable NX permanently and remove SMM related fixes from the BIOS, resulting in permanent lowering of the security of the backdoored computer, even after complete earasing of hard disks and reinstallation of a new operating system. We shall also demonstrate that preexisting work on MBR subvertions such as bootkiting and preboot authentication software bruteforce can be embedded in Rakshasa with little effort. More over, Rakshasa is built on top of free software, including the Coreboot project, meaning that most of its source code is already public. This presentation will take a deep dive into Coreboot and hardware components such as the BIOS, CMOS and PIC embedded on the motherboard, before detailing the inner workings of Rakshasa and demo its capabilities. It is hoped to raise awareness of the security community regarding the dangers associated with non open source firmwares shipped with any computer and question their integrity. This shall also result in upgrading the best practices for forensics and post intrusion analysis by including the afore mentioned firmwares as part of their scope of work.
[Defcon] Hardware backdooring is practicalMoabi.com
This presentation will demonstrate that permanent backdooring of hardware is practical. We have built a generic proof of concept malware for the intel architecture, Rakshasa, capable of infecting more than a hundred of different motherboards. The first net effect of Rakshasa is to disable NX permanently and remove SMM related fixes from the BIOS, resulting in permanent lowering of the security of the backdoored computer, even after complete earasing of hard disks and reinstallation of a new operating system. We shall also demonstrate that preexisting work on MBR subvertions such as bootkiting and preboot authentication software bruteforce can be embedded in Rakshasa with little effort. More over, Rakshasa is built on top of free software, including the Coreboot project, meaning that most of its source code is already public. This presentation will take a deep dive into Coreboot and hardware components such as the BIOS, CMOS and PIC embedded on the motherboard, before detailing the inner workings of Rakshasa and demo its capabilities. It is hoped to raise awareness of the security community regarding the dangers associated with non open source firmwares shipped with any computer and question their integrity. This shall also result in upgrading the best practices for forensics and post intrusion analysis by including the afore mentioned firmwares as part of their scope of work.
Bringing up Android on your favorite X86 Workstation or VM (AnDevCon IV, 2012)Ron Munitz
My session at AnDevCon IV, December 2012, Burlingame, CA.
This class introduces the concepts of AOSP and how to use it in order to configure and build one of the most popular Android devices available: The Android emulator, for an x86 target. You will then learn a reincarnation of the AOSP, intended to bring Android to as many x86 devices as possible. You will see its structure and compare it with the AOSP, and demonstrate how such a build works within Virtual Box, QEMU and more.
For Training/Consulting requests: info@thepscg.com
Palestra realizada por Toronto Garcez aka torontux durante a 3a. edição da Nullbyte Security Conference em 26 de novembro de 2016.
Resumo:
O objetivo da apresentação é demonstrar de forma prática, o passo-a-passo para criar uma botnet com roteadores wi-fi e/ou embarcados em geral. Será demonstrado o desenvolvimento de um comando e controle e a utilização de firmwares "backdorados" para tornar dispositivos em bots.
I hope to see more hacks of STM8 based devices since we have sdcc compiler with support for stm8, cheap SWIM programmer in form of ST-Link v2 (Chinese clones, which are also useful as ARM SWD programmers) and STM8 has comparable features to 8-bit AVR micro-controllers but cheaper.
Bringing up Android on your favorite X86 Workstation or VM (AnDevCon Boston, ...Ron Munitz
My session at AnDevCon Bostong, May 2013, Boston, MA.
This class introduces the concepts of AOSP and how to use it in order to configure and build one of the most popular Android devices available: The Android emulator, for an x86 target. You will then learn a reincarnation of the AOSP, intended to bring Android to as many x86 devices as possible. You will see its structure and compare it with the AOSP, and demonstrate how such a build works within Virtual Box, QEMU and more.
LEVEL: Intermediate
TOPIC AREA: Embedded Android
For Training/Consulting requests: info@thepscg.com
Presentation at October SG Android Developer Meetup by Jeff Pang.
Jeff Pang shows us how you can build your own Android Tablet using BeagleBone and a capacitive touch screen.
BeagleBone is an $89 MSRP, credit-card-sized Linux computer that connects to the Internet and runs software such as Android 4.0 and Ubuntu. With plenty of I/O and processing power for real-time analysis provided by an AM335x 720MHz ARM® processor, BeagleBone can be complemented with cape plug-in boards to augment functionality.
Hardware backdooring is practical : slidesMoabi.com
This presentation will demonstrate that permanent backdooring of hardware is practical. We have built a generic proof of concept malware for the intel architecture, Rakshasa, capable of infecting more than a hundred of different motherboards. The first net effect of Rakshasa is to disable NX permanently and remove SMM related fixes from the BIOS, resulting in permanent lowering of the security of the backdoored computer, even after complete earasing of hard disks and reinstallation of a new operating system. We shall also demonstrate that preexisting work on MBR subvertions such as bootkiting and preboot authentication software bruteforce can be embedded in Rakshasa with little effort. More over, Rakshasa is built on top of free software, including the Coreboot project, meaning that most of its source code is already public. This presentation will take a deep dive into Coreboot and hardware components such as the BIOS, CMOS and PIC embedded on the motherboard, before detailing the inner workings of Rakshasa and demo its capabilities. It is hoped to raise awareness of the security community regarding the dangers associated with non open source firmwares shipped with any computer and question their integrity. This shall also result in upgrading the best practices for forensics and post intrusion analysis by including the afore mentioned firmwares as part of their scope of work.
[Defcon] Hardware backdooring is practicalMoabi.com
This presentation will demonstrate that permanent backdooring of hardware is practical. We have built a generic proof of concept malware for the intel architecture, Rakshasa, capable of infecting more than a hundred of different motherboards. The first net effect of Rakshasa is to disable NX permanently and remove SMM related fixes from the BIOS, resulting in permanent lowering of the security of the backdoored computer, even after complete earasing of hard disks and reinstallation of a new operating system. We shall also demonstrate that preexisting work on MBR subvertions such as bootkiting and preboot authentication software bruteforce can be embedded in Rakshasa with little effort. More over, Rakshasa is built on top of free software, including the Coreboot project, meaning that most of its source code is already public. This presentation will take a deep dive into Coreboot and hardware components such as the BIOS, CMOS and PIC embedded on the motherboard, before detailing the inner workings of Rakshasa and demo its capabilities. It is hoped to raise awareness of the security community regarding the dangers associated with non open source firmwares shipped with any computer and question their integrity. This shall also result in upgrading the best practices for forensics and post intrusion analysis by including the afore mentioned firmwares as part of their scope of work.
Bringing up Android on your favorite X86 Workstation or VM (AnDevCon IV, 2012)Ron Munitz
My session at AnDevCon IV, December 2012, Burlingame, CA.
This class introduces the concepts of AOSP and how to use it in order to configure and build one of the most popular Android devices available: The Android emulator, for an x86 target. You will then learn a reincarnation of the AOSP, intended to bring Android to as many x86 devices as possible. You will see its structure and compare it with the AOSP, and demonstrate how such a build works within Virtual Box, QEMU and more.
For Training/Consulting requests: info@thepscg.com
Palestra realizada por Toronto Garcez aka torontux durante a 3a. edição da Nullbyte Security Conference em 26 de novembro de 2016.
Resumo:
O objetivo da apresentação é demonstrar de forma prática, o passo-a-passo para criar uma botnet com roteadores wi-fi e/ou embarcados em geral. Será demonstrado o desenvolvimento de um comando e controle e a utilização de firmwares "backdorados" para tornar dispositivos em bots.
I hope to see more hacks of STM8 based devices since we have sdcc compiler with support for stm8, cheap SWIM programmer in form of ST-Link v2 (Chinese clones, which are also useful as ARM SWD programmers) and STM8 has comparable features to 8-bit AVR micro-controllers but cheaper.
MYS-6ULX Single Board Computer for Industry 4.0 and IoT ApplicationsLinda Zhang
The document introduced MYIR's i.MX 6UL / 6ULL based ARM Cortex-A7 Single Board Computer for Industry 4.0 and IoT applications which is ready to run Linux with high performance and ulta low cost.
The Nano SOM from Mistral is an extremely small footprint (44mm * 26 mm) System-on-Module; weighing just 7gms; which can be used directly in your end product design.
HI-3220 ARINC 429 DATA MANAGEMENT ENGINE
16 x RECEIVERS, 8 x TRANSMITTERS, ADK-3220. Application Development Kit Users Guide and High Density 16Rx / 8Tx or 8Rx / 4Tx ARINC 429 HI-3220 datasheet.
MYD-Y6ULX Development Board for i.MX 6UL/6ULL ARM Cortex-A7 ProcessorsLinda Zhang
The MYD-Y6ULX development board is a complete evaluation platform for NXP’s i.MX 6UltraLite / 6ULL processor family, which can operate at 528 MHz and features the most efficient ARM Cortex-A7 core, providing various memory interfaces and enhancing the flexibility and convenience of the board to connect peripheral devices. The board is ready to run Linux and supports industrial operating temperature range from -40 to +85 Celsius. employs the MYC-Y6ULX CPU Module as the controller board by populating the CPU Module on its base board through 1.0mm pitch 140-pin stamp hole interface. The MYC-Y6ULX CPU Module is mounted with a shield cover and integrated with core components including i.MX 6UltraLite / 6ULL processor, 256MB DDR3, 256MB Nand Flash or optional 4GB eMMC and Ethernet PHY. The base board has extended rich peripherals through connectors and headers like Serial ports, USB, Ethernet, CAN, Micro SD card, WiFi module, LCD/Touch screen, Camera, Audio as well as a Mini PCIe interface for optional USB based 4G LTE module. It is a versatile platform and solid reference design delivered with necessary cable accessories and detailed documentations ideal for prototype and evaluation based on i.MX 6UL/6ULL solutions.
Micro XRCE-DDS is eProsima’s implementation of the DDS-XRCE standard, which allows communicating eXtremely Resource Constrained Environments (XRCEs) with an existing DDS network.
Micro XRCE-DDS is also the default middleware of micro-ROS, the official extension of ROS 2 (The Robot Operating System) for microcontrollers (MCUs).
Find out about the Micro XRCE-DDS protocol and the micro-ROS framework and how they are a revolution for the microcontrollers world.
2. 2
Simple and Flexible
2
OpenCR Summary
개요
ROS 오픈 소스를 활용한 커뮤니티와 학계, 기업이 함께 기술을 공유하는 프로젝트.
OROCA, 로보티즈, OSRF 협업.
ROS 2.0 Embedded Board 를 지향하는 하드웨어, F/W 개발.
참여 인력
OROCA 참여자: 표윤석, iMachine, BlueSky7, Baram, 박차장
개발 자료 공개 주소
https://github.com/ROBOTIS-GIT/OpenCR
4. 4
Simple and Flexible
4
OpenCR Specification 2/2
5. LEDs and buttons
LD2 (red/green) : USB communication
STM32 boot-select pin using a 2x1 100mil header pair and a jumper (for USB Device
Firmware Upgrade (DFU))
User LED x 4 : LD3 (red), LD4 (green), LD5 (blue)
User button x 2
6. Communication circuits
USB (Micro-B USB connector / USB 2.0 full speed / Host&Peripehral / OTG)
TTL (JST 3pin / Dynamixel), RS485 (JST 4pin / Dynamixel)
UART, CAN
7. Powers
External input source
: 5 V (USB VBUS), 7-24 V (Battery or SMPS)
: Default battery: LI-PO 11.1V 1,800mAh 19.98Wh
External output source
: 12V@1A, 5V@4A, 3.3V@800mA
Power LED, Reset button, Power on/off switch x 1
8. Battery charge circuits
Current control circuit failure.