2018 IEEE 24th International Symposium on on-Line Testing and Robust System Design (IOLTS) 2018
DOI: 10.1109/iolts.2018.8474188
|View full text |Cite
|
Sign up to set email alerts
|

Detecting and Resolving Security Violations in Reconfigurable Scan Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 15 publications
0
3
0
2
Order By: Relevance
“…In [50] the same authors enhanced this approach resorting to a model checking technique to verify some security properties of the RSN. More recently, in [51] the authors proposed a new method that detects security violations in the RSN and structurally transforms it into a secure RSN. The security specification for applying this model is based on the definition of a trust category for each instrument, together with the definition of a sensitivity level of the data that are shifted through the RSN.…”
Section: Towards a Formalization Of Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…In [50] the same authors enhanced this approach resorting to a model checking technique to verify some security properties of the RSN. More recently, in [51] the authors proposed a new method that detects security violations in the RSN and structurally transforms it into a secure RSN. The security specification for applying this model is based on the definition of a trust category for each instrument, together with the definition of a sensitivity level of the data that are shifted through the RSN.…”
Section: Towards a Formalization Of Securitymentioning
confidence: 99%
“…It is composed of a series of IJTAG networks, described in the ICL language, of different complexities. These benchmarks have recently found their first application as experimental platform for RSN security purpose in [51].…”
Section: Towards a Formalization Of Securitymentioning
confidence: 99%
“…Based on this, many countermeasures are put forward to counter the scan-based attacks [35][36][37][38][39][40][41][42][43][44]. Previously, the existing advanced DFT architecture includes test response compactor, X-masker [45,46], and X-tolerance [47,48].…”
Section: Introductionmentioning
confidence: 99%
“…IEEE P1687 标准 [1] 也被称为内部联合测试行 动组(internal joint test action group, IJTAG), 使用 段插入位(segment insert bit, SIB)构建可重构扫描 网络, 通过向 SIB 移入配置数据改变扫描链. 虽然在可重构扫描网络中可以灵活地配置扫 描路径, 但是也存在着一些安全问题 [2][3] [4][5][6][7][8][9][10][11][12] ; 另一类是防止恶意仪 器对传输数据的窜改和嗅探攻击 [13][14][15][16] . 文献 [4][5] 通过使用多个分布式密钥位增大未经授权用户对 重要仪器访问的难度.…”
unclassified
“…文献 [4][5] 通过使用多个分布式密钥位增大未经授权用户对 重要仪器访问的难度. 文献 [6][7] [4][5][6][7][8][9][10][11][12] , 能使 IJTAG 网络免受恶意 仪器对传输数据的嗅探或窜改 [13][14][15][16] Step1.…”
unclassified