IEEE P1687内部JTAG (IJTAG)

A. Ivanov
{"title":"IEEE P1687内部JTAG (IJTAG)","authors":"A. Ivanov","doi":"10.1109/MDAT.2013.2283590","DOIUrl":null,"url":null,"abstract":"h IN LIGHT OF the recent introduction of IEEE’s P1687, Internal JTAG (IJTAG) standard, the first half of this special issue is dedicated to familiarizing our readers with some of the experiences and drawbacks, implementations and troubleshooting challenges, and other economic and technical implications that the proposed standard raises. Such an evolution from the older established technologies and practices necessitates that we extract from relevant work done by industry professionals and high-profile researchers to help bring our readers up to speed. This is what we hope to have accomplished here. In true Design and Test form, we have also included some variety on the back end of the issue, to round out the P1687 articles with an international vantage on different approaches to addressing faults and defects at different levels of abstraction and integration, including the threats posed by hardware Trojans. We begin our issue on the topic of IJTAG with an article by authors in industry and academia from Texas and California that provide a new perspective on FPGA-based testers in light of IJTAG. They show that for each IC or board design, embedded FPGA testers must be reconfigured, proving difficult for creating standardized observation systems. The authors propose a methodology that effectively allows embedded vectors to automatically be retargeted to the TAP port of the FPGA. Ultimately, they show how to create a standardized Command, Control, and Observation system. Second, we present a paper from the AlcatelLucent Labs in Villarceaux, France, and New Jersey, which outlines some shortcomings in traditional vector-level control of dynamic IJTAG operations. The authors introduce state machine-level control, which forms a more comprehensive solution allowing a greater potential usage of IJTAG. Our next article, compiled by researchers in Tallinn, Estonia, proposes a new instrumentation infrastructure, based on IJTAG, which supports fault management that automatically collects and delivers detection information to operating systems. The authors specifically demonstrate the efficiency of this infrastructure. Next, we receive a breather from the deeply technical side of things, in favor of viewing the effects of the latest IJTAG on the fiscal element of our industry. Martin Keim, from Mentor Graphics, explores three industry scenarios, showing the cost of adopting IJTAG versus the costs of sticking with older, traditional systems. Then we step out of the IJTAG box and begin our latter half of the issue with an analysis of the clustering of defects on silicon wafers. A group of authors from Southeast Asia present a new, flexible three-stage automation tool aimed at improving cluster analysis, while also offering sufficient devicespecific customization to allow the accommodation of a wide variety of product types. Next, researchers from Huazhong University, China, reiterate concerns in the security of highcapacity storage of critical sensitive information, and counter these concerns by implementing integrity protection and off-chip memory encryption using the Advanced Encryption StandardVGalois/ Counter Mode. This approach is also shown to lower the overhead of memory and performance.","PeriodicalId":50392,"journal":{"name":"IEEE Design & Test of Computers","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/MDAT.2013.2283590","citationCount":"0","resultStr":"{\"title\":\"A Look at IEEE P1687 Internal JTAG (IJTAG)\",\"authors\":\"A. Ivanov\",\"doi\":\"10.1109/MDAT.2013.2283590\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"h IN LIGHT OF the recent introduction of IEEE’s P1687, Internal JTAG (IJTAG) standard, the first half of this special issue is dedicated to familiarizing our readers with some of the experiences and drawbacks, implementations and troubleshooting challenges, and other economic and technical implications that the proposed standard raises. Such an evolution from the older established technologies and practices necessitates that we extract from relevant work done by industry professionals and high-profile researchers to help bring our readers up to speed. This is what we hope to have accomplished here. In true Design and Test form, we have also included some variety on the back end of the issue, to round out the P1687 articles with an international vantage on different approaches to addressing faults and defects at different levels of abstraction and integration, including the threats posed by hardware Trojans. We begin our issue on the topic of IJTAG with an article by authors in industry and academia from Texas and California that provide a new perspective on FPGA-based testers in light of IJTAG. They show that for each IC or board design, embedded FPGA testers must be reconfigured, proving difficult for creating standardized observation systems. The authors propose a methodology that effectively allows embedded vectors to automatically be retargeted to the TAP port of the FPGA. Ultimately, they show how to create a standardized Command, Control, and Observation system. Second, we present a paper from the AlcatelLucent Labs in Villarceaux, France, and New Jersey, which outlines some shortcomings in traditional vector-level control of dynamic IJTAG operations. The authors introduce state machine-level control, which forms a more comprehensive solution allowing a greater potential usage of IJTAG. Our next article, compiled by researchers in Tallinn, Estonia, proposes a new instrumentation infrastructure, based on IJTAG, which supports fault management that automatically collects and delivers detection information to operating systems. The authors specifically demonstrate the efficiency of this infrastructure. Next, we receive a breather from the deeply technical side of things, in favor of viewing the effects of the latest IJTAG on the fiscal element of our industry. Martin Keim, from Mentor Graphics, explores three industry scenarios, showing the cost of adopting IJTAG versus the costs of sticking with older, traditional systems. Then we step out of the IJTAG box and begin our latter half of the issue with an analysis of the clustering of defects on silicon wafers. A group of authors from Southeast Asia present a new, flexible three-stage automation tool aimed at improving cluster analysis, while also offering sufficient devicespecific customization to allow the accommodation of a wide variety of product types. Next, researchers from Huazhong University, China, reiterate concerns in the security of highcapacity storage of critical sensitive information, and counter these concerns by implementing integrity protection and off-chip memory encryption using the Advanced Encryption StandardVGalois/ Counter Mode. This approach is also shown to lower the overhead of memory and performance.\",\"PeriodicalId\":50392,\"journal\":{\"name\":\"IEEE Design & Test of Computers\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1109/MDAT.2013.2283590\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Design & Test of Computers\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MDAT.2013.2283590\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Design & Test of Computers","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MDAT.2013.2283590","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

鉴于最近引入的IEEE P1687,内部JTAG (IJTAG)标准,本特刊的前半部分致力于让读者熟悉一些经验和缺点,实现和故障排除挑战,以及提议的标准所带来的其他经济和技术影响。这种从旧的成熟技术和实践的演变需要我们从行业专业人士和知名研究人员所做的相关工作中提取,以帮助我们的读者跟上速度。这就是我们希望在这里达成的目标。在真正的设计和测试形式中,我们还在该问题的后端包含了一些变化,使P1687文章在解决不同抽象和集成级别的故障和缺陷(包括硬件木马造成的威胁)的不同方法方面具有国际优势。我们以一篇来自德克萨斯州和加利福尼亚州的工业界和学术界的作者的文章开始我们关于IJTAG主题的问题,该文章根据IJTAG提供了基于fpga的测试器的新视角。他们表明,对于每个IC或板设计,嵌入式FPGA测试仪必须重新配置,这证明了创建标准化观察系统的困难。作者提出了一种方法,有效地允许嵌入式向量自动重新定位到FPGA的TAP端口。最后,他们展示了如何创建一个标准化的指挥、控制和观察系统。其次,我们介绍了一篇来自法国Villarceaux和新泽西州AlcatelLucent实验室的论文,其中概述了动态IJTAG操作的传统矢量级控制的一些缺点。作者介绍了状态机级别的控制,它形成了一个更全面的解决方案,允许更大的潜在使用IJTAG。我们的下一篇文章是由爱沙尼亚塔林的研究人员编写的,提出了一种基于IJTAG的新的仪器基础结构,它支持故障管理,可以自动收集并向操作系统提供检测信息。作者特别展示了这种基础设施的效率。接下来,我们将从技术层面的问题中得到喘息的机会,以便了解最新的IJTAG对我们行业财政因素的影响。Mentor Graphics的Martin Keim探讨了三种行业场景,展示了采用IJTAG的成本与坚持使用旧的传统系统的成本。然后我们走出IJTAG盒子,开始我们的问题的后半部分,分析硅晶圆上的缺陷聚类。来自东南亚的一组作者提出了一种新的,灵活的三阶段自动化工具,旨在改进聚类分析,同时还提供足够的设备特定定制,以允许适应各种产品类型。接下来,来自中国华中大学的研究人员重申了对关键敏感信息大容量存储安全性的关注,并通过使用高级加密标准galois / counter模式实现完整性保护和片外存储加密来解决这些问题。这种方法还可以降低内存开销和性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Look at IEEE P1687 Internal JTAG (IJTAG)
h IN LIGHT OF the recent introduction of IEEE’s P1687, Internal JTAG (IJTAG) standard, the first half of this special issue is dedicated to familiarizing our readers with some of the experiences and drawbacks, implementations and troubleshooting challenges, and other economic and technical implications that the proposed standard raises. Such an evolution from the older established technologies and practices necessitates that we extract from relevant work done by industry professionals and high-profile researchers to help bring our readers up to speed. This is what we hope to have accomplished here. In true Design and Test form, we have also included some variety on the back end of the issue, to round out the P1687 articles with an international vantage on different approaches to addressing faults and defects at different levels of abstraction and integration, including the threats posed by hardware Trojans. We begin our issue on the topic of IJTAG with an article by authors in industry and academia from Texas and California that provide a new perspective on FPGA-based testers in light of IJTAG. They show that for each IC or board design, embedded FPGA testers must be reconfigured, proving difficult for creating standardized observation systems. The authors propose a methodology that effectively allows embedded vectors to automatically be retargeted to the TAP port of the FPGA. Ultimately, they show how to create a standardized Command, Control, and Observation system. Second, we present a paper from the AlcatelLucent Labs in Villarceaux, France, and New Jersey, which outlines some shortcomings in traditional vector-level control of dynamic IJTAG operations. The authors introduce state machine-level control, which forms a more comprehensive solution allowing a greater potential usage of IJTAG. Our next article, compiled by researchers in Tallinn, Estonia, proposes a new instrumentation infrastructure, based on IJTAG, which supports fault management that automatically collects and delivers detection information to operating systems. The authors specifically demonstrate the efficiency of this infrastructure. Next, we receive a breather from the deeply technical side of things, in favor of viewing the effects of the latest IJTAG on the fiscal element of our industry. Martin Keim, from Mentor Graphics, explores three industry scenarios, showing the cost of adopting IJTAG versus the costs of sticking with older, traditional systems. Then we step out of the IJTAG box and begin our latter half of the issue with an analysis of the clustering of defects on silicon wafers. A group of authors from Southeast Asia present a new, flexible three-stage automation tool aimed at improving cluster analysis, while also offering sufficient devicespecific customization to allow the accommodation of a wide variety of product types. Next, researchers from Huazhong University, China, reiterate concerns in the security of highcapacity storage of critical sensitive information, and counter these concerns by implementing integrity protection and off-chip memory encryption using the Advanced Encryption StandardVGalois/ Counter Mode. This approach is also shown to lower the overhead of memory and performance.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Design & Test of Computers
IEEE Design & Test of Computers 工程技术-工程:电子与电气
自引率
0.00%
发文量
1
审稿时长
>12 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信