2022
DOI: 10.1109/access.2022.3164712
|View full text |Cite
|
Sign up to set email alerts
|

A Secure JTAG Wrapper for SoC Testing and Debugging

Abstract: IEEE Std. 1149.1, also known as the Joint Test Access Group (JTAG) standard, provides excellent controllability and observability for ICs and hence is widely used in IC testing, debugging, failure analysis, or even online chip control/monitoring. Unfortunately, it has also become a backdoor for attackers to manipulate the ICs or grab confidential information from the ICs. One way to address this problem is to disable JTAG pins after manufacturing testing. However this countermeasure prohibits the in-filed test… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…In [22], to further reduce the power consumption of the extra gates, the authors proposed a single CMOS XORNAND gate to drive the clock terminals of the FFs. The power dissipation was estimated in 𝑃 𝐺𝐢 [22] β‰ˆ 𝑛𝛼𝑃 𝐹𝐹 β€² + 𝑛 𝑑 𝛼𝑃 𝑋𝑂𝑅 + 𝑛𝛼𝑃 𝑋𝑂𝑅𝑁𝐴𝑁𝐷 (4) but, the reduction in the overall power dissipation with respect to a traditional (non-gated clock) LFSR was no better than 10%, thus limiting the benefit of the proposed topology.…”
Section: B Dynamic Power Managementmentioning
confidence: 99%
“…In [22], to further reduce the power consumption of the extra gates, the authors proposed a single CMOS XORNAND gate to drive the clock terminals of the FFs. The power dissipation was estimated in 𝑃 𝐺𝐢 [22] β‰ˆ 𝑛𝛼𝑃 𝐹𝐹 β€² + 𝑛 𝑑 𝛼𝑃 𝑋𝑂𝑅 + 𝑛𝛼𝑃 𝑋𝑂𝑅𝑁𝐴𝑁𝐷 (4) but, the reduction in the overall power dissipation with respect to a traditional (non-gated clock) LFSR was no better than 10%, thus limiting the benefit of the proposed topology.…”
Section: B Dynamic Power Managementmentioning
confidence: 99%
“…It provides good observability and controllability for users to access the Test Data Registers (TDRs) and Boundary-Scan Cells (BSCs) through the Test Access Port (TAP). As a result, users can test and debug ICs using a variety of techniques, including post-silicon debugging, chip reconfiguration, verification, power management, and clock control [40].…”
Section: G Secure Debugging and Testingmentioning
confidence: 99%
“…In these methods, a secure debug architecture is equipped with stream or block ciphers to protect the data flow during the debug process [18] [17]. In addition, researchers have also proposed password-based methods to ensure secure debugging through authentication [12] using a dynamic or pre-defined password. One step ahead are techniques that use challenge-response protocols such as physically unclonable functions (PUFs) to protect the security of the debug process.…”
Section: Introductionmentioning
confidence: 99%