Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/260
Title: On Protecting IJTAG from Data Sniffing and Alteration Attacks
Authors: Riaz A.
Kumar G.
Tudu J.
Ahlawat S.
Keywords: data alteration
data sniffing
IEEE Std. 1687
IJTAG
scan attack
SIB
Issue Date: 2022
Publisher: IEEE Computer Society
Abstract: The IEEE 1687 standard (IJTAG) paves a way to the efficient access of on-chip instruments which are embedded on-chip for test, diagnosis, post-silicon debug, etc. These instruments which are provided by various untrusted third parties in the form of IPs, generally have wrapped Test Data Register (TDR). A malicious IP in the IJTAG network can sniff and possibly manipulate the data shifted in the IJTAG network and potentially expose the design/data to an untrusted entity. This paper provides a comprehensive approach to protect the test data in the IJTAG network from sniffing and alteration attack by a malicious instrument. The proposed scheme protects the test/functional data of an instrument by bypassing the shifting of test/functional data through the TDR of other instruments and hence devoid a malicious instrument the opportunity of sniffing and alteration. Also, the proposed approach keeps the basic IJTAG functionality intact. Moreover, it is highly scalable and incurs minimal area overhead as compared to the existing countermeasures. © 2022 IEEE.
URI: https://dx.doi.org/10.1109/ISVLSI54635.2022.00038
http://localhost:8080/xmlui/handle/123456789/260
ISBN: 978-1665466059
ISSN: 2159-3469
Appears in Collections:Conference Paper

Files in This Item:
There are no files associated with this item.
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.