USB Armory is an Open Source Hardware Freescale i.MX53 Dongle for Security Applications

Most computers-on-a-stick come with an HDMI port, and a few USB ports, but Inverse Path’s dongle is quite different. USB Armory is a flash drive sized computer powered by Freescale i.MX53 Cortex A8 processor with only a USB port and a micro SD slot, that targets security applications such as mass storage devices with automatic encryption, virus scanning, host authentication and data self-destruct, VPN routers, electronic wallets, password managers, portable penetration testing platforms, and so on.

Inverse_path_USB_armoryUSB Armory specifications:

  • SoC – Freescale i.MX53 ARM Cortex-A8 @ 800Mhz with ARM TrustZone
  • System Memory – 512MB DDR3 RAM
  • Storage – microSD card slot
  • USB – 1x USB host port. USB device emulation: CDC Ethernet, mass storage, HID, etc.
  • Expansion Header – 5-pin breakout header with GPIOs and UART
  • Misc – customizable LED, including secure mode detection
  • Power – 5V via USB  (<500 mA power consumption)
  • Dimensions – 65 x 19 x 6 mm

The board is said to run Android, Debian, Ubuntu, and FreeBSD. USB Armory is open source hardware and software, and you can already find the Kicad schematics and PCB layout files for the alpha version, distributed under a GPL v2 license, on github. Some software documentation can be found on the project’s Wiki, with firmware images coming later. Security features are achieved through ARM Trustzone which allows for secure and normal zones, and you may want to read a Trustzone on i.MX53 article on Genode OS framework project for more technical details.

USB armory is still under development, but you can register your interest on Crowdsupply where it should sell for less than 100 Euros later this year. Some more information is also available on Inverse Path’s USB Armory page.

Share this:
FacebookTwitterHacker NewsSlashdotRedditLinkedInPinterestFlipboardMeWeLineEmailShare

Support CNX Software! Donate via cryptocurrencies, become a Patron on Patreon, or purchase goods on Amazon or Aliexpress

ROCK Pi 4C Plus

5 Replies to “USB Armory is an Open Source Hardware Freescale i.MX53 Dongle for Security Applications”

  1. Is the USB “chad” device, host, OTG, …? I don’t understand how it interacts with the OS. Device emulation? via software? How should I go about learning more about these concepts?

  2. @Morgan Ross Egging
    It’s either seen as a mass storage device (like a normal flash drive), or CDC Ethernet device (like a router), so you can run a server on that thing and access it via an IP address too. I think these are standard USB device classes.

  3. @Morgan Ross Egging
    There are USB device classes for just about everything. There is no technical reason why it couldn’t act as any kind of USB device at all, other than OTG, as it doesn’t have another power source.

Leave a Reply

Your email address will not be published. Required fields are marked *

Khadas VIM4 SBC
Khadas VIM4 SBC