2012
DOI: 10.5573/jsts.2012.12.2.240
|View full text |Cite
|
Sign up to set email alerts
|

Debug Port Protection Mechanism for Secure Embedded Devices

Abstract: Abstract-In this paper we propose a protection mechanism for the debug port. While debug ports are useful tools for embedded device development and maintenance, they can also become potential attack tools for device hacking in case their usage is permitted to hackers with malicious intentions. The proposed approach prevents illicit use of debug ports by controlling access through user authentication, where the device generates and issues authentication token only to the server-authenticated users. An authentic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Stronger authentication schemes, which do not reveal the secret during communication with the chip, are based on challenge-response protocols [21], [22], [23], [24], [25], [26], [27]: In these schemes, upon a request of an entity e ∈ E to access a protected instrument i ∈ I P , the chip provides a non-repeating challenge value and expects the entity to provide an expected response value. The response is calculated from the challenge, the secret k i , and possibly the secret k e , using a specified cryptographic algorithm, e.g.…”
Section: Problem Formulation and Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Stronger authentication schemes, which do not reveal the secret during communication with the chip, are based on challenge-response protocols [21], [22], [23], [24], [25], [26], [27]: In these schemes, upon a request of an entity e ∈ E to access a protected instrument i ∈ I P , the chip provides a non-repeating challenge value and expects the entity to provide an expected response value. The response is calculated from the challenge, the secret k i , and possibly the secret k e , using a specified cryptographic algorithm, e.g.…”
Section: Problem Formulation and Related Workmentioning
confidence: 99%
“…To reduce the amount of online communication, the secure server can also issue credentials which can later be used by the entity to gain offline access to the chip [24]. To limit the number of allowed offline accesses, a similar approach based on authentication tokens was later proposed by the same authors [25]. For provably secure mutual authentication, an application of the Schnorr protocol was proposed recently in [26].…”
Section: Problem Formulation and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Another risk is password leakage, especially when all fabricated instances share the same password. Protocol-based schemes use more complex techniques for authentication [18]- [21]. Specifically, a trusted server is used to manage the multi-stage authentication between the user and the device, but has the drawback of requiring network availability.…”
Section: Introductionmentioning
confidence: 99%