A Graph Theory Approach towards IJTAG Security via Controlled Scan Chain Isolation
Title | A Graph Theory Approach towards IJTAG Security via Controlled Scan Chain Isolation |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Das, Abhishek, Touba, Nur A. |
Conference Name | 2019 IEEE 37th VLSI Test Symposium (VTS) |
Date Published | April 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-1170-4 |
Keywords | authorisation, Clocks, Complexity theory, composability, controlled scan chain isolation, data integrity, data integrity attacks, data manipulation, data protection scheme, data sniffing, debug, design for test, Diagnosis, electronic design automation, embedded instruments, Embedded systems, graph coloring problem, graph colouring, graph theory approach, hidden test-data registers, IEEE standards, IEEE Std 1687, IEEE Std. 1687, IJTAG, IJTAG network, IJTAG security, Instruments, intellectual property security, isolation signals, microprocessor chips, on-chip access, on-chip instruments, policy-based governance, power consumption, pubcrawl, Registers, resilience, Resiliency, scan chain, security, security of data, system-on-chip, system-on-chip designs, third party intellectual property providers, unauthorized user access, untrusted sources |
Abstract | The IEEE Std. 1687 (IJTAG) was designed to provide on-chip access to the various embedded instruments (e.g. built-in self test, sensors, etc.) in complex system-on-chip designs. IJTAG facilitates access to on-chip instruments from third party intellectual property providers with hidden test-data registers. Although access to on-chip instruments provides valuable data specifically for debug and diagnosis, it can potentially expose the design to untrusted sources and instruments that can sniff and possibly manipulate the data that is being shifted through the IJTAG network. This paper provides a comprehensive protection scheme against data sniffing and data integrity attacks by selectively isolating the data flowing through the IJTAG network. The proposed scheme is modeled as a graph coloring problem to optimize the number of isolation signals required to protect the design. It is shown that combining the proposed approach with other existing schemes can also bolster the security against unauthorized user access as well. The proposed countermeasure is shown to add minimal overhead in terms of area and power consumption. |
URL | https://ieeexplore.ieee.org/document/8758608 |
DOI | 10.1109/VTS.2019.8758608 |
Citation Key | das_graph_2019 |
- Registers
- IJTAG network
- IJTAG security
- Instruments
- intellectual property security
- isolation signals
- microprocessor chips
- on-chip access
- on-chip instruments
- policy-based governance
- power consumption
- pubcrawl
- IJTAG
- resilience
- Resiliency
- scan chain
- security
- security of data
- system-on-chip
- system-on-chip designs
- third party intellectual property providers
- unauthorized user access
- untrusted sources
- Diagnosis
- Clocks
- Complexity theory
- composability
- controlled scan chain isolation
- data integrity
- Data Integrity Attacks
- data manipulation
- data protection scheme
- data sniffing
- debug
- design for test
- authorisation
- electronic design automation
- embedded instruments
- embedded systems
- graph coloring problem
- graph colouring
- graph theory approach
- hidden test-data registers
- IEEE standards
- IEEE Std 1687
- IEEE Std. 1687