{"title":"Echeloned IJTAG data protection","authors":"Senwen Kan, Jennifer Dworak, J. Dunham","doi":"10.1109/AsianHOST.2016.7835558","DOIUrl":null,"url":null,"abstract":"This paper presents a novel IJTAG-based data protection method that utilizes stream ciphers and IJTAG topology. The method protects IJTAG data with encryption. It further imposes access restriction on user control sequencing. In particular, it complements IJTAG encryption-based data access with IJTAG topology, and it augments IJTAG-based authorization checks to defend against unauthorized and unintended access. It also allows the device owner to implement use case isolation for better compartmentalization of the supply chain.","PeriodicalId":394462,"journal":{"name":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"27","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsianHOST.2016.7835558","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 27
Abstract
This paper presents a novel IJTAG-based data protection method that utilizes stream ciphers and IJTAG topology. The method protects IJTAG data with encryption. It further imposes access restriction on user control sequencing. In particular, it complements IJTAG encryption-based data access with IJTAG topology, and it augments IJTAG-based authorization checks to defend against unauthorized and unintended access. It also allows the device owner to implement use case isolation for better compartmentalization of the supply chain.