http://10.10.120.238:8080/xmlui/handle/123456789/206
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kumar G. | en_US |
dc.contributor.author | Riaz A. | en_US |
dc.contributor.author | Prasad Y. | en_US |
dc.contributor.author | Ahlawat S. | en_US |
dc.date.accessioned | 2023-11-30T08:13:17Z | - |
dc.date.available | 2023-11-30T08:13:17Z | - |
dc.date.issued | 2022 | - |
dc.identifier.isbn | 978-1665490054 | - |
dc.identifier.issn | 2324-8432 | - |
dc.identifier.other | EID(2-s2.0-85142445000) | - |
dc.identifier.uri | https://dx.doi.org/10.1109/VLSI-SoC54400.2022.9939634 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/206 | - |
dc.description.abstract | Today's integrated circuits contain a large number and variety of embedded instruments that support testing, infield monitoring, post-silicon validation, etc. The IEEE Std. 1687 (IJTAG) provides efficient access to these embedded instruments by dynamically reconfiguring the IJTAG network. At the same time, it opens a backdoor for malicious users to steal sensitive information. Hence, access to embedded instruments through IJTAG must be restricted/secured. Various techniques have been proposed to prevent unauthorized access to the IJTAG network. One such very effective technique that improves the security of IJTAG network is a secure access protocol that uses licensed access software, Locking SIB (LSIB) and Chip ID. Although this technique is simple to implement and is very effective against scan attacks | en_US |
dc.description.abstract | however, it does not consider the power analysis attack.In this study, it is demonstrated that the security of the secure access protocol technique could be easily breached using a power analysis side-channel attack. The attack leads to unauthorized access to the embedded instruments which in turn could be used for various malicious purposes. Moreover, a countermeasure that mitigates the efficacy of power analysis attack significantly is proposed. It incurs a minimal area overhead and can be easily integrated into the existing secure access protocol. © 2022 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE Computer Society | en_US |
dc.source | IEEE/IFIP International Conference on VLSI and System-on-Chip, VLSI-SoC | en_US |
dc.subject | IEEE Std. 1687 | en_US |
dc.subject | IJTAG | en_US |
dc.subject | Power analysis | en_US |
dc.subject | SIB | en_US |
dc.title | Power Analysis Attack on Locking SIB based IJTAG Achitecture | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | Conference Paper |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.