This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Attacks and Defenses for JTAG
January/February 2010 (vol. 27 no. 1)
pp. 36-47
Kurt Rosenfeld, Polytechnic Institute of New York University
Ramesh Karri, Polytechnic Institute of New York University

Editor's note:

JTAG is a well-known standard mechanism for in-field test. Although it provides high controllability and observability, it also poses great security challenges. This article analyzes various attacks and proposes protection schemes.

—Mohammad Tehranipoor, University of Connecticut

1. B. Yang, K. Wu, and R. Karri, "Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard," Proc. Int'l Test Conf. (ITC 04), IEEE CS Press, 2004, pp. 339-344.
2. "Dish Net: In House Made with a Locking Script"; http://www.satcardsrus.comdish_net%203m.htm .
3. B. Yang, R. Karri, and K. Wu, "Secure Scan: A Design-for-Test Architecture for Crypto Chips," Proc. 42nd Design Automation Conf. (DAC 05), ACM Press, 2005, pp. 135-140.
4. F. Novak and A. Biasizzo, "Security Extension for IEEE Std 1149.1," J. Electronic Testing, vol. 22, no. 3, 2006, pp. 301-303.
5. G. Suh and S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation," Proc. 44th Design Automation Conf. (DAC 07), ACM Press, 2007, pp. 9-14.
6. C.D. Canniere and B. Preneel, Trivium Specifications, ECRYPT Stream Cipher Project, 2006.
7. B. Arazi, "Message Authentication in Computationally Constrained Environments," IEEE Trans. Mobile Computing, vol. 8, no. 7, 2009, pp. 968-974.
8. X. Lai, R. Rueppel, and J. Woollven, "A Fast Cryptographic Check-Sum Algorithm Based on Stream Ciphers," Advances in Cryptology-AusCrypt, Springer-Verlag, 1992, pp. 339-348.
9. Fwaggle, "Howto: JTAG Interface on a Dish 3700 Receiver," http://www.hungryhacker.com/articles/misc dish3700_jtag.
10. Y. Jin and Y. Makris, "Hardware Trojan Detection Using Path Delay Fingerprint," Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 08), IEEE CS Press, 2008, pp. 51-57.

Index Terms:
design and test, embedded test, hardware security, JTAG, security
Citation:
Kurt Rosenfeld, Ramesh Karri, "Attacks and Defenses for JTAG," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 36-47, Jan.-Feb. 2010, doi:10.1109/MDT.2010.9
Usage of this product signifies your acceptance of the Terms of Use.