메뉴 건너뛰기




Volumn 27, Issue 1, 2010, Pages 36-47

Attacks and defenses for JTAG

Author keywords

[No Author keywords available]

Indexed keywords

CONTROLLABILITY AND OBSERVABILITIES; FIELD TEST; IN-FIELD; PROTECTION SCHEMES; SECURITY CHALLENGES; UNIVERSITY OF CONNECTICUT; VARIOUS ATTACKS;

EID: 76949096868     PISSN: 07407475     EISSN: None     Source Type: Journal    
DOI: 10.1109/MDT.2010.9     Document Type: Article
Times cited : (124)

References (10)
  • 1
    • 18144420462 scopus 로고    scopus 로고
    • Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard
    • Β. Yang Κ. Wu R. Karri Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard Proc. Int'l Test Conf. (ITC 04) 339 344 Proc. Int'l Test Conf. (ITC 04) 2004
    • (2004) , pp. 339-344
    • Yang, Β.1    Wu, Κ.2    Karri, R.3
  • 2
    • 85177137804 scopus 로고    scopus 로고
    • Dish Net: In House Made with a Locking Script http:// www.satcardsrus.com/dish_net%203m.htm
  • 3
    • 27944506419 scopus 로고    scopus 로고
    • Secure Scan: A Design-for-Test Architecture for Crypto Chips
    • Β. Yang R. Karri Κ. Wu Secure Scan: A Design-for-Test Architecture for Crypto Chips Proc. 42rid Design Automation Conf. (DAC 05) 135 140 Proc. 42rid Design Automation Conf. (DAC 05) 2005
    • (2005) , pp. 135-140
    • Yang, Β.1    Karri, R.2    Wu, Κ.3
  • 4
    • 33747873451 scopus 로고    scopus 로고
    • Security Extension for IEEE Std 1149.1
    • F. Novak A. Biasizzo Security Extension for IEEE Std 1149.1 J. Electronic Testing 22 3 301 303 2006
    • (2006) J. Electronic Testing , vol.22 , Issue.3 , pp. 301-303
    • Novak, F.1    Biasizzo, A.2
  • 5
    • 34547307341 scopus 로고    scopus 로고
    • Physical Unclonable Functions for Device Authentication and Secret Key Generation
    • G. Suh S. Devadas Physical Unclonable Functions for Device Authentication and Secret Key Generation Proc. 44th Design Automation Conf. (DAC 07) 9 14 Proc. 44th Design Automation Conf. (DAC 07) 2007
    • (2007) , pp. 9-14
    • Suh, G.1    Devadas, S.2
  • 6
    • 85177116402 scopus 로고    scopus 로고
    • Trivium Specifications 2006 ECRYPT Stream Cipher Project
    • (2006)
  • 7
    • 67349199140 scopus 로고    scopus 로고
    • Message Authentication in Computationally Constrained Environments
    • Β. Arazi Message Authentication in Computationally Constrained Environments IEEE Trans. Mobile Computing 8 7 968 974 2009
    • (2009) IEEE Trans. Mobile Computing , vol.8 , Issue.7 , pp. 968-974
    • Arazi, Β.1
  • 8
    • 85177143746 scopus 로고
    • Advances in Cryptology AusCrypt
    • A Fast Cryptographic Check-Sum Algorithm Based on Stream Ciphers Springer-Verlag
    • X. Lai R. Rueppel J. Woollven Advances in Cryptology AusCrypt 339 348 1992 Springer-Verlag A Fast Cryptographic Check-Sum Algorithm Based on Stream Ciphers
    • (1992) , pp. 339-348
    • Lai, X.1    Rueppel, R.2    Woollven, J.3
  • 9
    • 85177119636 scopus 로고    scopus 로고
    • Fwaggle Howto: JTAG Interface on a Dish 3700 Receiver http://www.hungryhacker.com/articles/misc/ dish3700_jtag
    • Fwaggle1
  • 10
    • 51849095999 scopus 로고    scopus 로고
    • Hardware Trojan Detection Using Path Delay Fingerprint
    • Y. Jin Y. Makris Hardware Trojan Detection Using Path Delay Fingerprint Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 08) 51 57 Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 08) 2008
    • (2008) , pp. 51-57
    • Jin, Y.1    Makris, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.