Attacks and Defenses for JTAG
- 5 February 2010
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Design & Test of Computers
- Vol. 27 (1), 36-47
- https://doi.org/10.1109/mdt.2010.9
Abstract
JTAG is a well-known standard mechanism for in-field test. Although it provides high controllability and observability, it also poses great security challenges. This article analyzes various attacks and proposes protection schemes.Keywords
This publication has 4 references indexed in Scilit:
- Message Authentication in Computationally Constrained EnvironmentsIEEE Transactions on Mobile Computing, 2009
- Security Extension for IEEE Std 1149.1Journal of Electronic Testing, 2006
- Scan based side channel attack on dedicated hardware implementations of Data Encryption StandardPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Secure scan: a design-for-test architecture for crypto chipsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005