Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/204
Title: On Attacking Locking SIB based IJTAG Architecture
Authors: Kumar G.
Riaz A.
Prasad Y.
Ahlawat S.
Keywords: board security
IEEE 1687
instruments
LSIB
machine learning
Issue Date: 2022
Publisher: Association for Computing Machinery
Abstract: The IEEE 1687 standard, which is commonly used for efficient access of on-chip instruments, could be exploited by an intruder and thus needs to be secured. One of the techniques to alleviate the vulnerability of 1687 network is to use a secure access protocol that is based on licensed access software, Chip ID and locking SIB. A licensed access software is generally used to gain control of the embedded instruments and use them as per requirement. In this paper, a successful attack using various machine learning algorithms has been instigated on secure access protocol scheme. It is demonstrated that machine learning algorithms have the potential of breaching the secure communication between the access software and the board and hence access the sensitive instruments. Furthermore, Random Forest significantly outperforms the other models in terms of breaking the security. © 2022 ACM.
URI: https://dx.doi.org/10.1145/3526241.3530370
http://localhost:8080/xmlui/handle/123456789/204
ISBN: 978-1450393225
Appears in Collections:Conference Paper

Files in This Item:
There are no files associated with this item.
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.