{"title":"Multi-Level Access Protection for Future IEEE P1687.1 IJTAG Networks","authors":"David Brauchler, Jennifer Dworak","doi":"10.1109/ITC44778.2020.9325276","DOIUrl":null,"url":null,"abstract":"Embedded instruments are responsible for aiding in a wide range of tasks engineers must perform on integrated circuits (ICs), including testing, debugging, and analysis. The IEEE 1687 IJTAG standard provides efficient access to these instruments without specifying proper measures to establish access control to sensitive data on the ICs. Previously, the impact of this exposure was generally limited to local attackers obtaining proprietary information from a device to which they have physical access. However, newer endeavors such as IEEE P1687.1 aim to extend IJTAG access to other serial ports, broadening the attack surface to additional local and remote attackers alike. In order to protect these components from local and remote attackers, we describe a lightweight and low-cost protocol to authenticate users that offers solutions to access control, key distribution, and insecure secrets stored on-chip.","PeriodicalId":251504,"journal":{"name":"2020 IEEE International Test Conference (ITC)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Test Conference (ITC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITC44778.2020.9325276","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Embedded instruments are responsible for aiding in a wide range of tasks engineers must perform on integrated circuits (ICs), including testing, debugging, and analysis. The IEEE 1687 IJTAG standard provides efficient access to these instruments without specifying proper measures to establish access control to sensitive data on the ICs. Previously, the impact of this exposure was generally limited to local attackers obtaining proprietary information from a device to which they have physical access. However, newer endeavors such as IEEE P1687.1 aim to extend IJTAG access to other serial ports, broadening the attack surface to additional local and remote attackers alike. In order to protect these components from local and remote attackers, we describe a lightweight and low-cost protocol to authenticate users that offers solutions to access control, key distribution, and insecure secrets stored on-chip.