JTAG Security Extension Using Locking Mechanism ( work in progress )

نویسندگان

  • Anton Biasizzo
  • Franc Novak
  • Jozef Stefan
چکیده

In this paper we address the security problems of systems incorporating JTAG test infrastructure and briefly review the proposed solutions. In the following, we focus on JTAG locking mechanism and indicate some modifications to improve its resistance against possible attacks. Keywords—JTAG; security; locking mechanism;

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Extension for IEEE Std 1149.1

A security extension for IEEE Std 1149.1 is proposed. It provides a locking mechanism which prevents unauthorised users to interfere via test bus with the system normal operation. The security extension requires small hardware overhead and allows full conformance with IEEE Std 1149.1.

متن کامل

Analysis of Factors That Motivate Agricultural Extension Agents in Abia State Agricultural Development Programme (ADP)

The study analyzed factors that motivate agricultural extension agents in Agricultural Development Programme of Abia State. Primary data were collected from 96 extension agents in Abia State, Nigeria who were selected using multi-stage random sampling technique. Data were analyzed using descriptive statistics, mean score, ordered logit and Spearman rank correlation. It was revealed that 58.3% o...

متن کامل

Secure JTAG Implementation Using Schnorr Protocol

The standard IEEE 1149.1 (Test Access Port and Boundary-Scan Architecture, also known as JTAG port) provides a useful interface for embedded systems development, debug, and test. In an 1149.1-compatible integrated circuit, the JTAG port allows the circuit to be easily accessed from the external world, and even to control and observe the internal scan chains of the circuit. However, the JTAG por...

متن کامل

Protecting test port of embedded systems to keep data safe

Security is a growing concern for embedded system designers. Therefore a wide range of protection mechanisms have been developed in the recent years to counter malicious attacks. This work gives an overview and compares existing solutions concerning the protection of the test access port. Potential improvements are then proposed over some of the previous works. Keywords—security, JTAG, IEEE 168...

متن کامل

An extension to JTAG for at-speed debug on a system

When developing new designs, debugging the prototype is important to resolve application malfunction. During this board design debug, often a few pins of an IC are measured to check signals. Access to these pins is becoming more difficult due to packages like BGA. The JTAG port is an efficient mechanism to gain more access to the ICs. A method is presented to reconfigure the boundary scan chain...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013