2014
DOI: 10.1007/s10836-014-5484-2
|View full text |Cite
|
Sign up to set email alerts
|

Access Port Protection for Reconfigurable Scan Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0
2

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(9 citation statements)
references
References 29 publications
0
7
0
2
Order By: Relevance
“…R. Baranowski et al proposed in [45] a detection technique for filtering the access to the testing infrastructure. This solution is based on sequence filters that are placed on the TAP controller.…”
Section: ) Static Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…R. Baranowski et al proposed in [45] a detection technique for filtering the access to the testing infrastructure. This solution is based on sequence filters that are placed on the TAP controller.…”
Section: ) Static Detectionmentioning
confidence: 99%
“…This implies that it is not possible to change the access policies without a complete redesign of the detectors. In the solution [45] the possibility of performing post-manufacturing test using different policies is contemplated. Nevertheless, once the filters are activated, it is not possible to obtain the higher privileges anymore.…”
Section: ) Static Detectionmentioning
confidence: 99%
“…Recently, we proposed a method for protecting individual instruments using sequence filters that are placed locally at the TAP and require no additional global wiring and no modification of the infrastructure [30], [31]. A sequence filter monitors all access operations and blocks them if they do not follow an allowed pattern.…”
Section: Problem Formulation and Related Workmentioning
confidence: 99%
“…• Experimental results show that the area overhead is only slightly sensitive to the number of protected instruments, and it is negligible if a hash core and a random number generator are already available on-chip. If slight modifications of the scan infrastructure are allowed, the authorization mechanism presented in this paper is preferable to our previous technique based on sequence filters [30], [31], especially when just a small fraction of instruments is protected. If required, the security of the proposed scheme can be further improved by replacing the underlying challengeresponse protocol with other authentication mechanisms, e.g.…”
Section: Problem Formulation and Related Workmentioning
confidence: 99%
See 1 more Smart Citation