2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST) 2016
DOI: 10.1109/asianhost.2016.7835558
|View full text |Cite
|
Sign up to set email alerts
|

Echeloned IJTAG data protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(25 citation statements)
references
References 13 publications
0
25
0
Order By: Relevance
“…The SESC technique proposed in [19] does not present the same vulnerability as the previous countermeasures in [9], [17] and [18] concerning the differential scan attacks. The seed used to initialize the stream cipher is randomly generated, consequently encrypting with a different keystream at each reset of the circuit.…”
Section: A Security Analysismentioning
confidence: 93%
See 3 more Smart Citations
“…The SESC technique proposed in [19] does not present the same vulnerability as the previous countermeasures in [9], [17] and [18] concerning the differential scan attacks. The seed used to initialize the stream cipher is randomly generated, consequently encrypting with a different keystream at each reset of the circuit.…”
Section: A Security Analysismentioning
confidence: 93%
“…Stream ciphers are also used on IJTAG reconfigurable scan networks (RSN) in [18]. A TRIVIUM cipher encrypts and decrypts the data shifted in and out of the RSN.…”
Section: State-of-the-art Countermeasures Based On Test Communicamentioning
confidence: 99%
See 2 more Smart Citations
“…In [5], [9] and [10] the JTAG communication is encrypted resorting to the TRIVIUM stream cipher. The IV is normally hardwired into the device.…”
Section: State-of-the-artmentioning
confidence: 99%