Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/207
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKumar G.en_US
dc.contributor.authorRiaz A.en_US
dc.contributor.authorPrasad Y.en_US
dc.contributor.authorAhlawat S.en_US
dc.date.accessioned2023-11-30T08:13:17Z-
dc.date.available2023-11-30T08:13:17Z-
dc.date.issued2022-
dc.identifier.isbn978-1665473552-
dc.identifier.otherEID(2-s2.0-85141434803)-
dc.identifier.urihttps://dx.doi.org/10.1109/IOLTS56730.2022.9897172-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/207-
dc.description.abstractIn recent decennium, hardware security has gained a lot of attention due to different types of attacks being launched, such as IP theft, reverse engineering, counterfeiting, etc. The critical testing infrastructure incorporated into ICs is very popular among attackers to mount side-channel attacks. The IEEE standard 1687 (IJTAG) is one such testing infrastructure that is the focus of attackers these days. To secure access to the IJTAG network, various techniques based on Locking SIB (LSIB) have been proposed. One such very effective technique makes use of Security Linear Feedback Shift Register (SLFSR) along with LSIB. The SLFSR obfuscates the scan chain information from the attacker and hence makes the brute-force attack against LSIB ineffective.In this work, it is shown that the SLFSR based Locking SIB is vulnerable to side-channel attacks. A power analysis attack along with known-plaintext attack is used to determine the IJTAG network structure. First, the known-plaintext attack is used to retrieve the SLFSR design information. This information is further used along with power analysis attack to determine the exact length of the scan chain which in turn breaks the whole security scheme. Further, a countermeasure is proposed to prevent the aforementioned hybrid attack. © 2022 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceProceedings - 2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design, IOLTS 2022en_US
dc.subjectIEEE standard 1687en_US
dc.subjectKnown-plaintext attacken_US
dc.subjectLSIBen_US
dc.subjectPower analysisen_US
dc.subjectSLFSRen_US
dc.titleOn Attacking IJTAG Architecture based on Locking SIB with Security LFSRen_US
dc.typeConference Paperen_US
Appears in Collections:Conference Paper

Files in This Item:
There are no files associated with this item.
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.