4.5 Article

Security Against Data-Sniffing and Alteration Attacks in IJTAG

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

ScanSAT: Unlocking Static and Dynamic Scan Obfuscation

Lilas Alrahis et al.

Summary: This paper discusses scan chain obfuscation technique and introduces an attack method called ScanSAT that can break both static and dynamic scan obfuscation schemes with a 100% success rate. The attack is effective even for large key sizes and in the presence of scan compression.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Detecting Hardware Trojans with Gate-Level Information-Flow Tracking

Wei Hu et al.

COMPUTER (2016)

Article Computer Science, Hardware & Architecture

Reconfigurable Scan Networks: Modeling, Verification, and Optimal Pattern Generation

Rafal Baranowski et al.

ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS (2015)

Article Computer Science, Hardware & Architecture

Fine-Grained Access Management in Reconfigurable Scan Networks

Rafal Baranowski et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2015)

Proceedings Paper Computer Science, Hardware & Architecture

Securing IEEE 1687-2014 Standard Instrumentation Access by LFSR Key

Hejia Liu et al.

2015 IEEE 24TH ASIAN TEST SYMPOSIUM (ATS) (2015)

Article Computer Science, Hardware & Architecture

Leveraging Gate-Level Properties to Identify Hardware Timing Channels

Jason Oberg et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2014)

Article Engineering, Electrical & Electronic

Access Port Protection for Reconfigurable Scan Networks

Rafal Baranowski et al.

JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS (2014)

Proceedings Paper Computer Science, Hardware & Architecture

Securing Access to Reconfigurable Scan Networks

Rafal Baranowski et al.

2013 22ND ASIAN TEST SYMPOSIUM (ATS) (2013)

Article Computer Science, Hardware & Architecture

Reusing and Retargeting On-Chip Instrument Access Procedures in IEEE P1687

Farrokh Ghani Zadegan et al.

IEEE DESIGN & TEST OF COMPUTERS (2012)

Article Computer Science, Software Engineering

Secure program execution via dynamic information flow tracking

GE Suh et al.

ACM SIGPLAN NOTICES (2004)