Visible to the public A Graph Theory Approach towards IJTAG Security via Controlled Scan Chain Isolation

TitleA Graph Theory Approach towards IJTAG Security via Controlled Scan Chain Isolation
Publication TypeConference Paper
Year of Publication2019
AuthorsDas, Abhishek, Touba, Nur A.
Conference Name2019 IEEE 37th VLSI Test Symposium (VTS)
Date PublishedApril 2019
PublisherIEEE
ISBN Number978-1-7281-1170-4
Keywordsauthorisation, Clocks, Complexity theory, composability, controlled scan chain isolation, data integrity, data integrity attacks, data manipulation, data protection scheme, data sniffing, debug, design for test, Diagnosis, electronic design automation, embedded instruments, Embedded systems, graph coloring problem, graph colouring, graph theory approach, hidden test-data registers, IEEE standards, IEEE Std 1687, IEEE Std. 1687, IJTAG, IJTAG network, IJTAG security, Instruments, intellectual property security, isolation signals, microprocessor chips, on-chip access, on-chip instruments, policy-based governance, power consumption, pubcrawl, Registers, resilience, Resiliency, scan chain, security, security of data, system-on-chip, system-on-chip designs, third party intellectual property providers, unauthorized user access, untrusted sources
Abstract

The IEEE Std. 1687 (IJTAG) was designed to provide on-chip access to the various embedded instruments (e.g. built-in self test, sensors, etc.) in complex system-on-chip designs. IJTAG facilitates access to on-chip instruments from third party intellectual property providers with hidden test-data registers. Although access to on-chip instruments provides valuable data specifically for debug and diagnosis, it can potentially expose the design to untrusted sources and instruments that can sniff and possibly manipulate the data that is being shifted through the IJTAG network. This paper provides a comprehensive protection scheme against data sniffing and data integrity attacks by selectively isolating the data flowing through the IJTAG network. The proposed scheme is modeled as a graph coloring problem to optimize the number of isolation signals required to protect the design. It is shown that combining the proposed approach with other existing schemes can also bolster the security against unauthorized user access as well. The proposed countermeasure is shown to add minimal overhead in terms of area and power consumption.

URLhttps://ieeexplore.ieee.org/document/8758608
DOI10.1109/VTS.2019.8758608
Citation Keydas_graph_2019