2015 IEEE 24th Asian Test Symposium (ATS) 2015
DOI: 10.1109/ats.2015.23
|View full text |Cite
|
Sign up to set email alerts
|

Securing IEEE 1687-2014 Standard Instrumentation Access by LFSR Key

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0
2

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(4 citation statements)
references
References 8 publications
0
2
0
2
Order By: Relevance
“…In fact, the authors proposed a parallel IJTAG structure with increased bandwidth and showed that using LSIBs instead of SIBs, the same security level is granted. H. Liu and V. Agrawal [33] proposed a different kind of LSIB that relies on a Secure LFSR (SLFSR) integrated in the scan network. The SLFSR is placed downstream the LSIB that must be protected.…”
Section: ) Locking Sibmentioning
confidence: 99%
See 1 more Smart Citation
“…In fact, the authors proposed a parallel IJTAG structure with increased bandwidth and showed that using LSIBs instead of SIBs, the same security level is granted. H. Liu and V. Agrawal [33] proposed a different kind of LSIB that relies on a Secure LFSR (SLFSR) integrated in the scan network. The SLFSR is placed downstream the LSIB that must be protected.…”
Section: ) Locking Sibmentioning
confidence: 99%
“…The techniques based on LSIBs presented in [20] and [33] rely on a secret password established at design time and hardwired inside the logic of the LSIB. Moreover, the solution [33] also relies on an LFSR whose polynomial is established at design time. For this reason, any leak of this information undermines the security of all the samples that share the same design.…”
Section: ) Locking Sibmentioning
confidence: 99%
“…IEEE P1687 标准 [1] 也被称为内部联合测试行 动组(internal joint test action group, IJTAG), 使用 段插入位(segment insert bit, SIB)构建可重构扫描 网络, 通过向 SIB 移入配置数据改变扫描链. 虽然在可重构扫描网络中可以灵活地配置扫 描路径, 但是也存在着一些安全问题 [2][3] [4][5][6][7][8][9][10][11][12] ; 另一类是防止恶意仪 器对传输数据的窜改和嗅探攻击 [13][14][15][16] . 文献 [4][5] 通过使用多个分布式密钥位增大未经授权用户对 重要仪器访问的难度.…”
unclassified
“…文献 [4][5] 通过使用多个分布式密钥位增大未经授权用户对 重要仪器访问的难度. 文献 [6][7] [4][5][6][7][8][9][10][11][12] , 能使 IJTAG 网络免受恶意 仪器对传输数据的嗅探或窜改 [13][14][15][16] Step1.…”
unclassified