Lee et al., 2016 - Google Patents
A brief review on jtag securityLee et al., 2016
- Document ID
- 8818404562669330054
- Author
- Lee K
- Lee Y
- Lee H
- Yim K
- Publication year
- Publication venue
- 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
External Links
Snippet
In this paper, we outline security issues on IEEE 1149.1 JTAG. The JTAG interface is provided for its beneficial features, such as debugging and downloading firmware, but attackers are abusing it by reverse engineering and by modifying firmware. Hence, they are …
- 238000000034 method 0 abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mohammad et al. | Required policies and properties of the security engine of an SoC | |
| Zhao et al. | Providing root of trust for ARM TrustZone using on-chip SRAM | |
| US7810002B2 (en) | Providing trusted access to a JTAG scan interface in a microprocessor | |
| Cirne et al. | Hardware security for internet of things identity assurance | |
| Valea et al. | A survey on security threats and countermeasures in IEEE test standards | |
| US9633185B2 (en) | Device having secure JTAG and debugging method for the same | |
| KR20170095161A (en) | Secure system on chip | |
| Pierce et al. | Enhanced secure architecture for joint action test group systems | |
| KR20060127206A (en) | Secure mode controlled memory | |
| Khattri et al. | Hsdl: A security development lifecycle for hardware technologies | |
| KR20110034631A (en) | Apparatus and method for protecting digital information on an integrated circuit during a test mode of operation | |
| Schellekens et al. | Embedded trusted computing with authenticated non-volatile memory | |
| Sami et al. | End-to-end secure soc lifecycle management | |
| Jacob et al. | faulTPM: Exposing AMD fTPMs’ Deepest Secrets | |
| Streit et al. | Secure boot from non-volatile memory for programmable SoC architectures | |
| Backer et al. | Secure design-for-debug for systems-on-chip | |
| Lee et al. | A brief review on jtag security | |
| US11899827B2 (en) | Establishing trust in untrusted IC testing and provisioning environment | |
| Lee et al. | A secure JTAG wrapper for SoC testing and debugging | |
| Kan et al. | IJTAG integrity checking with chained hashing | |
| Bhakthavatchalu et al. | Verilog design of programmable JTAG controller for digital VLSI IC’s | |
| Kumar et al. | A novel holistic security framework for in-field firmware updates | |
| Limaye et al. | Antidote: Protecting debug against outsourced test entities | |
| Sami et al. | SAP: Silicon Authentication Platform for System-on-Chip Supply Chain Vulnerabilities | |
| Infrastructure et al. | Common criteria for information technology security evaluation |