S2 - Evaluating Security of New Locking SIB-based Architectures
Visualitza/Obre
S2-1.pdf (1,429Mb) (Accés restringit)
Estadístiques de LA Referencia / Recolecta
Inclou dades d'ús des de 2022
Cita com:
hdl:2117/372139
Tipus de documentText en actes de congrés
Data publicació2022-05
Condicions d'accésAccés restringit per política de l'editorial
Llevat que s'hi indiqui el contrari, els
continguts d'aquesta obra estan subjectes a la llicència de Creative Commons
:
Reconeixement-NoComercial-SenseObraDerivada 4.0 Internacional
Abstract
The IEEE Std 1687 (IJTAG) provides enhanced
access to the on-chip test instruments, which are included on
the chip for test, post-silicon debug, in field maintenance, and
diagnosis purposes. Although the on-chip instruments access
provides data and features explicitly for test and debug, these
features are misused by the malicious user to access sensitive
data such as encryption keys, Chip-IDs, etc. Hence, it is desired
to limit the access to sensitive on-chip instruments via IJTAG
network. One of the various schemes proposed to mitigate the
vulnerability of the IJTAG network is to use a secure access
protocol, which is based on LSIB, Chip-ID, and licensed access
software.
In this paper, the detailed security analysis is performed on
IJTAG, it is shown that the secure access protocol technique
is vulnerable to differential analysis attack. It can be used to
break the secure communication between the board and the
licensed access software and thus, the sensitive on-chip test
instruments can be accessed illegitimately. It is shown that our
proposed algorithm can recover the template used for secure
communication within a fraction of a second.
CitacióSao, Y. [et al.]. S2 - Evaluating Security of New Locking SIB-based Architectures. A: 27th IEEE European Test Symposium (ETS). 2022,
Versió de l'editorhttps://ieeexplore.ieee.org/xpl/conhome/9810327/proceeding
Fitxers | Descripció | Mida | Format | Visualitza |
---|---|---|---|---|
S2-1.pdf | 1,429Mb | Accés restringit |