2017 22nd IEEE European Test Symposium (ETS) 2017
DOI: 10.1109/ets.2017.7968247
|View full text |Cite
|
Sign up to set email alerts
|

Specification and verification of security in reconfigurable scan networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 21 publications
0
4
0
1
Order By: Relevance
“…Secure techniques based on restricted access to scan chains are proposed in [31,32,33]. The scheme proposed in [31] inhibits the normal scan operation if the user is unauthorized.…”
Section: Scan Design and Countermeasures Thwarting Scan Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Secure techniques based on restricted access to scan chains are proposed in [31,32,33]. The scheme proposed in [31] inhibits the normal scan operation if the user is unauthorized.…”
Section: Scan Design and Countermeasures Thwarting Scan Attacksmentioning
confidence: 99%
“…The scheme proposed in [31] inhibits the normal scan operation if the user is unauthorized. The technique proposed in [32] manages access to scan architecture by specifying and verifying multilevel access permission and restriction to instruments associated with the reconfigurable scan networks. Novak F. et al [33] modify the TAP (Test access port) controller to restrict access to scan chains.…”
Section: Scan Design and Countermeasures Thwarting Scan Attacksmentioning
confidence: 99%
“…[21], [23], [25], [28], [29]) are focusing on the integrity attribute, mostly addressing HW trojan detection . There also exist some works that additionally target ( [19], [20], [22], [24], [30]) or are exclusively considering ( [26], [27]) the confidentiality aspect.…”
Section: A Security Aspectsmentioning
confidence: 99%
“…Several solutions in security verification are restricted to target specific architectures or types of modules such as Reconfigurable Scan Networks (RSNs) [22], [26] or macroasynchronous micro-synchronous pipelines [29].…”
Section: A Security Aspectsmentioning
confidence: 99%
“…IEEE P1687 标准 [1] 也被称为内部联合测试行 动组(internal joint test action group, IJTAG), 使用 段插入位(segment insert bit, SIB)构建可重构扫描 网络, 通过向 SIB 移入配置数据改变扫描链. 虽然在可重构扫描网络中可以灵活地配置扫 描路径, 但是也存在着一些安全问题 [2][3] [4][5][6][7][8][9][10][11][12] ; 另一类是防止恶意仪 器对传输数据的窜改和嗅探攻击 [13][14][15][16] . 文献 [4][5] 通过使用多个分布式密钥位增大未经授权用户对 重要仪器访问的难度.…”
unclassified