A Survey on Security Threats and Countermeasures in IEEE Test Standards
Open Access
- 13 February 2019
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Design & Test
- Vol. 36 (3), 95-116
- https://doi.org/10.1109/mdat.2019.2899064
Abstract
Editor's note: Test infrastructure has been shown to be a portal for hackers. This article reviews the threats and countermeasures for IEEE test infrastructure standards.This publication has 43 references indexed in Scilit:
- Novel Test-Mode-Only Scan Attack and Countermeasure for Compression-Based Scan ArchitecturesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015
- Fine-Grained Access Management in Reconfigurable Scan NetworksIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015
- Access Port Protection for Reconfigurable Scan NetworksJournal of Electronic Testing, 2014
- Secure JTAG Implementation Using Schnorr ProtocolJournal of Electronic Testing, 2013
- Breakthrough Silicon Scanning Discovers Backdoor in Military ChipLecture Notes in Computer Science, 2012
- Scan-based attacks on linear feedback shift register based stream ciphersACM Transactions on Design Automation of Electronic Systems, 2011
- JTAG Security System Based on CredentialsJournal of Electronic Testing, 2010
- Security Extension for IEEE Std 1149.1Journal of Electronic Testing, 2006
- Forensic imaging of embedded systems using JTAG (boundary-scan)Digital Investigation, 2006
- Forensic Analysis of Mobile Phone Internal MemoryPublished by Springer Science and Business Media LLC ,2006