The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January/February (2010 vol.27)
pp: 36-47
Kurt Rosenfeld , Polytechnic Institute of New York University
Ramesh Karri , Polytechnic Institute of New York University
ABSTRACT
<p>Editor's note:</p><p>JTAG is a well-known standard mechanism for in-field test. Although it provides high controllability and observability, it also poses great security challenges. This article analyzes various attacks and proposes protection schemes.</p><p align="right"><it>&#x2014;Mohammad Tehranipoor, University of Connecticut</it></p>
INDEX TERMS
design and test, embedded test, hardware security, JTAG, security
CITATION
Kurt Rosenfeld, Ramesh Karri, "Attacks and Defenses for JTAG", IEEE Design & Test of Computers, vol.27, no. 1, pp. 36-47, January/February 2010, doi:10.1109/MDT.2010.9
REFERENCES
1. B. Yang, K. Wu, and R. Karri, "Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard," Proc. Int'l Test Conf. (ITC 04), IEEE CS Press, 2004, pp. 339-344.
2. "Dish Net: In House Made with a Locking Script"; http://www.satcardsrus.comdish_net%203m.htm .
3. B. Yang, R. Karri, and K. Wu, "Secure Scan: A Design-for-Test Architecture for Crypto Chips," Proc. 42nd Design Automation Conf. (DAC 05), ACM Press, 2005, pp. 135-140.
4. F. Novak and A. Biasizzo, "Security Extension for IEEE Std 1149.1," J. Electronic Testing, vol. 22, no. 3, 2006, pp. 301-303.
5. G. Suh and S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation," Proc. 44th Design Automation Conf. (DAC 07), ACM Press, 2007, pp. 9-14.
6. C.D. Canniere and B. Preneel, Trivium Specifications, ECRYPT Stream Cipher Project, 2006.
7. B. Arazi, "Message Authentication in Computationally Constrained Environments," IEEE Trans. Mobile Computing, vol. 8, no. 7, 2009, pp. 968-974.
8. X. Lai, R. Rueppel, and J. Woollven, "A Fast Cryptographic Check-Sum Algorithm Based on Stream Ciphers," Advances in Cryptology-AusCrypt, Springer-Verlag, 1992, pp. 339-348.
9. Fwaggle, "Howto: JTAG Interface on a Dish 3700 Receiver," http://www.hungryhacker.com/articles/misc dish3700_jtag.
10. Y. Jin and Y. Makris, "Hardware Trojan Detection Using Path Delay Fingerprint," Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 08), IEEE CS Press, 2008, pp. 51-57.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool