Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/206
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKumar G.en_US
dc.contributor.authorRiaz A.en_US
dc.contributor.authorPrasad Y.en_US
dc.contributor.authorAhlawat S.en_US
dc.date.accessioned2023-11-30T08:13:17Z-
dc.date.available2023-11-30T08:13:17Z-
dc.date.issued2022-
dc.identifier.isbn978-1665490054-
dc.identifier.issn2324-8432-
dc.identifier.otherEID(2-s2.0-85142445000)-
dc.identifier.urihttps://dx.doi.org/10.1109/VLSI-SoC54400.2022.9939634-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/206-
dc.description.abstractToday's integrated circuits contain a large number and variety of embedded instruments that support testing, infield monitoring, post-silicon validation, etc. The IEEE Std. 1687 (IJTAG) provides efficient access to these embedded instruments by dynamically reconfiguring the IJTAG network. At the same time, it opens a backdoor for malicious users to steal sensitive information. Hence, access to embedded instruments through IJTAG must be restricted/secured. Various techniques have been proposed to prevent unauthorized access to the IJTAG network. One such very effective technique that improves the security of IJTAG network is a secure access protocol that uses licensed access software, Locking SIB (LSIB) and Chip ID. Although this technique is simple to implement and is very effective against scan attacksen_US
dc.description.abstracthowever, it does not consider the power analysis attack.In this study, it is demonstrated that the security of the secure access protocol technique could be easily breached using a power analysis side-channel attack. The attack leads to unauthorized access to the embedded instruments which in turn could be used for various malicious purposes. Moreover, a countermeasure that mitigates the efficacy of power analysis attack significantly is proposed. It incurs a minimal area overhead and can be easily integrated into the existing secure access protocol. © 2022 IEEE.en_US
dc.language.isoenen_US
dc.publisherIEEE Computer Societyen_US
dc.sourceIEEE/IFIP International Conference on VLSI and System-on-Chip, VLSI-SoCen_US
dc.subjectIEEE Std. 1687en_US
dc.subjectIJTAGen_US
dc.subjectPower analysisen_US
dc.subjectSIBen_US
dc.titlePower Analysis Attack on Locking SIB based IJTAG Achitectureen_US
dc.typeConference Paperen_US
Appears in Collections:Conference Paper

Files in This Item:
There are no files associated with this item.
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.