Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Securing Scan Design Using Lock and Key Technique
DFT '05 Proceedings of the 20th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems
Security vs. Test Quality: Are they mutually exclusive?
ITC '04 Proceedings of the International Test Conference on International Test Conference
Low-cost and Universal Secure Scan: a Design- Architecture for Crypto Chips
DEPCOS-RELCOMEX '06 Proceedings of the International Conference on Dependability of Computer Systems
Security Extension for IEEE Std 1149.1
Journal of Electronic Testing: Theory and Applications
ICPPW '06 Proceedings of the 2006 International Conference Workshops on Parallel Processing
Securing Scan Control in Crypto Chips
Journal of Electronic Testing: Theory and Applications
Fast Digital TRNG Based on Metastable Ring Oscillator
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
IEEE Design & Test
Forensic imaging of embedded systems using JTAG (boundary-scan)
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Secure Scan: A Design-for-Test Architecture for Crypto Chips
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Secure JTAG Implementation Using Schnorr Protocol
Journal of Electronic Testing: Theory and Applications
Hi-index | 0.00 |
JTAG (Joint Test Access Group) is a powerful tool for the embedded system development environments. The features of JTAG, however, can be exploited by malicious users as a backdoor for launching attacks, an approach which now constitutes a major threat in the domain of device hacking. To deny unauthenticated users access to the features of JTAG port, this paper proposes a novel JTAG security mechanism. The proposed solution uses authentication based on credentials to achieve improved security and usability over existing solutions. Our approach is easily applicable to all standard JTAG environments because its structure is designed to be independent from the application environment. Further, the approach has lower implementation cost than encryption/decryption-based solutions since only hash and XOR calculations are employed in its authentication protocol. The security of the proposed mechanism has been verified through analysis against all forms of expected attacks, and its functionality is demonstrated with a real-life implementation.