Attacks and defenses for JTAG

被引:102
作者
Rosenfeld K. [1 ]
Karri R. [1 ]
机构
[1] Polytechnic Institute, New York University, University of California, San Diego
来源
IEEE Design and Test of Computers | 2010年 / 27卷 / 01期
基金
美国国家科学基金会;
关键词
D O I
10.1109/MDT.2010.9
中图分类号
学科分类号
摘要
Editor's note: JTAG is a well-known standard mechanism for in-field test. Although it provides high controllability and observability, it also poses great security challenges. This article analyzes various attacks and proposes protection schemes. -Mohammad Tehranipoor, University of Connecticut. © 2010 IEEE.
引用
收藏
页码:36 / 47
页数:11
相关论文
共 9 条
[1]  
Yang Beta., Wu Kappa., Karri R., Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard, pp. 339-344, (2004)
[2]  
Yang Beta., Karri R., Wu Kappa., Secure Scan: A Design-for-Test Architecture for Crypto Chips, pp. 135-140, (2005)
[3]  
Novak F., Biasizzo A., Security Extension for IEEE Std 1149.1, J. Electronic Testing, 22, 3, pp. 301-303, (2006)
[4]  
Suh G., Devadas S., Physical Unclonable Functions for Device Authentication and Secret Key Generation, pp. 9-14, (2007)
[5]  
(2006)
[6]  
Arazi Beta., Message Authentication in Computationally Constrained Environments, IEEE Trans. Mobile Computing, 8, 7, pp. 968-974, (2009)
[7]  
Lai X., Rueppel R., Woollven J., Advances in Cryptology AusCrypt, pp. 339-348, (1992)
[8]  
Fwaggle
[9]  
Jin Y., Makris Y., Hardware Trojan Detection Using Path Delay Fingerprint, pp. 51-57, (2008)