USB Armory is an Open Source Hardware Freescale i.MX53 Dongle for Security Applications

Orange Pi Development Boards

Most computers-on-a-stick come with an HDMI port, and a few USB ports, but Inverse Path’s dongle is quite different. USB Armory is a flash drive sized computer powered by Freescale i.MX53 Cortex A8 processor with only a USB port and a micro SD slot, that targets security applications such as mass storage devices with automatic encryption, virus scanning, host authentication and data self-destruct, VPN routers, electronic wallets, password managers, portable penetration testing platforms, and so on.

Inverse_path_USB_armoryUSB Armory specifications:

  • SoC – Freescale i.MX53 ARM Cortex-A8 @ 800Mhz with ARM TrustZone
  • System Memory – 512MB DDR3 RAM
  • Storage – microSD card slot
  • USB – 1x USB host port. USB device emulation: CDC Ethernet, mass storage, HID, etc.
  • Expansion Header – 5-pin breakout header with GPIOs and UART
  • Misc – customizable LED, including secure mode detection
  • Power – 5V via USB  (<500 mA power consumption)
  • Dimensions – 65 x 19 x 6 mm

The board is said to run Android, Debian, Ubuntu, and FreeBSD. USB Armory is open source hardware and software, and you can already find the Kicad schematics and PCB layout files for the alpha version, distributed under a GPL v2 license, on github. Some software documentation can be found on the project’s Wiki, with firmware images coming later. Security features are achieved through ARM Trustzone which allows for secure and normal zones, and you may want to read a Trustzone on i.MX53 article on Genode OS framework project for more technical details.

USB armory is still under development, but you can register your interest on Crowdsupply where it should sell for less than 100 Euros later this year. Some more information is also available on Inverse Path’s USB Armory page.

5
Leave a Reply

avatar
5 Comment threads
0 Thread replies
0 Followers
 
Most reacted comment
Hottest comment thread
3 Comment authors
NopcnxsoftMorgan Ross Egging Recent comment authors
  Subscribe  
newest oldest most voted
Notify of
Morgan Ross Egging
Guest

Is the USB “chad” device, host, OTG, …? I don’t understand how it interacts with the OS. Device emulation? via software? How should I go about learning more about these concepts?

Nop
Guest
Nop

@Morgan Ross Egging
There are USB device classes for just about everything. There is no technical reason why it couldn’t act as any kind of USB device at all, other than OTG, as it doesn’t have another power source.

Morgan Ross Egging
Guest

@cnxsoft
thank you