Secure JTAG Implementation Using Schnorr Protocol

  title={Secure JTAG Implementation Using Schnorr Protocol},
  author={A. Das and Jean DaRolt and S. Ghosh and S. Seys and S. Dupuis and G. Natale and M. Flottes and B. Rouzeyre and I. Verbauwhede},
  journal={Journal of Electronic Testing},
  • A. Das, Jean DaRolt, +6 authors I. Verbauwhede
  • Published 2013
  • Computer Science
  • Journal of Electronic Testing
  • The standard IEEE 1149.1 (Test Access Port and Boundary-Scan Architecture, also known as JTAG port) provides a useful interface for embedded systems development, debug, and test. In an 1149.1-compatible integrated circuit, the JTAG port allows the circuit to be easily accessed from the external world, and even to control and observe the internal scan chains of the circuit. However, the JTAG port can be also exploited by attackers to mount several cryptographic attacks. In this paper we propose… CONTINUE READING
    31 Citations

    Figures, Tables, and Topics from this paper

    Crypto Keys Based Secure Access Control for JTAG and Logic BIST Architecture
    • 4
    Preprint Access Port Protection for Reconfigurable Scan Networks
    • Highly Influenced
    • PDF
    Port Protection for Reconfigurable Scan Networks
    • Highly Influenced
    • PDF
    Access Port Protection for Reconfigurable Scan Networks
    • 20
    Stream vs block ciphers for scan encryption
    • 4
    • PDF
    IJTAG Integrity Checking with Chained Hashing
    • 3
    Fine-Grained Access Management in Reconfigurable Scan Networks
    • 43
    • PDF
    Secure design-for-debug for Systems-on-Chip
    • 10
    Test Versus Security: Past and Present
    • 66
    • PDF


    JTAG Security System Based on Credentials
    • 33
    Multi-level secure JTAG architecture
    • 17
    Protected JTAG
    • 37
    • Highly Influential
    Anti-tamper JTAG TAP design enables DRM to JTAG registers and P1687 on-chip instruments
    • Christopher J. Clark
    • Engineering, Computer Science
    • 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
    • 2010
    • 53
    An Area Optimized Reconfigurable Encryptor for AES-Rijndael
    • 18
    • PDF
    Guide to Elliptic Curve Cryptography
    • 2,642
    • PDF
    An ECDSA Processor for RFID Authentication
    • 47
    • PDF
    ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS
    • 22
    Integrated LFSR Reseeding, Test-Access Optimization, and Test Scheduling for Core-Based System-on-Chip
    • 36
    • PDF