TY - GEN
T1 - An Authentication-Based Secure IJTAG Network
AU - Yeh, Shih Chun
AU - Lee, Kuen Jong
AU - Chen, Dong Yi
N1 - Funding Information:
This work was partly supported by Qualcomm Inc. through a Qualcomm-Taiwan University Research Collaboration Project and partly by the Ministry of Science and Technology of Taiwan under Contract 109-2218-E-006-025-.
Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - The IEEE 1687 test standard provides an effective way to access on-chip instruments by an Internal Joint Test Action Group (IJTAG) network. However, it also leads to severe security problems because anyone can easily access these instruments through IJTAG networks. This paper proposes an authentication-based secure IJTAG network to defend the potential threats. The main idea is to ensure that instruments can be accessed only when users enter legal patterns. The secure structure generates different keys for different patterns to overcome the single key's weakness. If attackers shift in illegal patterns, they cannot manipulate target instruments. An obfuscator to generate fake output data is also developed to confuse attackers. The proposed method can defend against memory attacks, brute-force attacks, and reverse engineering attacks. Experimental results show that the proposed method requires only a small area overhead.
AB - The IEEE 1687 test standard provides an effective way to access on-chip instruments by an Internal Joint Test Action Group (IJTAG) network. However, it also leads to severe security problems because anyone can easily access these instruments through IJTAG networks. This paper proposes an authentication-based secure IJTAG network to defend the potential threats. The main idea is to ensure that instruments can be accessed only when users enter legal patterns. The secure structure generates different keys for different patterns to overcome the single key's weakness. If attackers shift in illegal patterns, they cannot manipulate target instruments. An obfuscator to generate fake output data is also developed to confuse attackers. The proposed method can defend against memory attacks, brute-force attacks, and reverse engineering attacks. Experimental results show that the proposed method requires only a small area overhead.
UR - http://www.scopus.com/inward/record.url?scp=85145877860&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85145877860&partnerID=8YFLogxK
U2 - 10.1109/ATS56056.2022.00017
DO - 10.1109/ATS56056.2022.00017
M3 - Conference contribution
AN - SCOPUS:85145877860
T3 - Proceedings of the Asian Test Symposium
SP - 25
EP - 30
BT - Proceedings - 2022 IEEE 31st Asian Test Symposium, ATS 2022
PB - IEEE Computer Society
T2 - 31st IEEE Asian Test Symposium, ATS 2022
Y2 - 21 November 2022 through 23 November 2022
ER -