An Authentication-Based Secure IJTAG Network

Shih Chun Yeh, Kuen Jong Lee, Dong Yi Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution


The IEEE 1687 test standard provides an effective way to access on-chip instruments by an Internal Joint Test Action Group (IJTAG) network. However, it also leads to severe security problems because anyone can easily access these instruments through IJTAG networks. This paper proposes an authentication-based secure IJTAG network to defend the potential threats. The main idea is to ensure that instruments can be accessed only when users enter legal patterns. The secure structure generates different keys for different patterns to overcome the single key's weakness. If attackers shift in illegal patterns, they cannot manipulate target instruments. An obfuscator to generate fake output data is also developed to confuse attackers. The proposed method can defend against memory attacks, brute-force attacks, and reverse engineering attacks. Experimental results show that the proposed method requires only a small area overhead.

Original languageEnglish
Title of host publicationProceedings - 2022 IEEE 31st Asian Test Symposium, ATS 2022
PublisherIEEE Computer Society
Number of pages6
ISBN (Electronic)9781665472272
Publication statusPublished - 2022
Event31st IEEE Asian Test Symposium, ATS 2022 - Taichung, Taiwan
Duration: 2022 Nov 212022 Nov 23

Publication series

NameProceedings of the Asian Test Symposium
ISSN (Print)1081-7735


Conference31st IEEE Asian Test Symposium, ATS 2022

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering


Dive into the research topics of 'An Authentication-Based Secure IJTAG Network'. Together they form a unique fingerprint.

Cite this