Visible to the public Research on Secure JTAG Debugging Model Based on Schnorr Identity Authentication Protocol

TitleResearch on Secure JTAG Debugging Model Based on Schnorr Identity Authentication Protocol
Publication TypeConference Paper
Year of Publication2020
AuthorsKai, Wang, Wei, Li, Tao, Chen, Longmei, Nan
Conference Name2020 IEEE 15th International Conference on Solid-State Integrated Circuit Technology (ICSICT)
Date Publishednov
Keywordsauthentication, composability, compositionality, Debugging, Encryption, Hardware, policy-based governance, privacy, protocol verification, Protocols, pubcrawl, security, system-on-chip
AbstractAs a general interface for chip system testing and on-chip debugging, JTAG is facing serious security threats. By analyzing the typical JTAG attack model and security protection measures, this paper designs a secure JTAG debugging model based on Schnorr identity authentication protocol, and takes RISCV as an example to build a set of SoC prototype system to complete functional verification. Experiments show that this secure JTAG debugging model has high security, flexible implementation, and good portability. It can meet the JTAG security protection requirements in various application scenarios. The maximum clock frequency can reach 833MHZ, while the hardware overhead is only 47.93KGate.
DOI10.1109/ICSICT49897.2020.9278378
Citation Keykai_research_2020