Visible to the public On Attacking IJTAG Architecture based on Locking SIB with Security LFSR

TitleOn Attacking IJTAG Architecture based on Locking SIB with Security LFSR
Publication TypeConference Paper
Year of Publication2022
AuthorsKumar, Gaurav, Riaz, Anjum, Prasad, Yamuna, Ahlawat, Satyadev
Conference Name2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)
Keywordsbrute force attacks, Collaboration, Human Behavior, human factors, Hybrid power systems, IEEE standard 1687, IEEE standards, integrated circuits, known-plaintext attack, Linear feedback shift registers, LSIB, policy-based governance, power analysis, pubcrawl, reverse engineering, security, side-channel attacks, SLFSR
AbstractIn recent decennium, hardware security has gained a lot of attention due to different types of attacks being launched, such as IP theft, reverse engineering, counterfeiting, etc. The critical testing infrastructure incorporated into ICs is very popular among attackers to mount side-channel attacks. The IEEE standard 1687 (IJTAG) is one such testing infrastructure that is the focus of attackers these days. To secure access to the IJTAG network, various techniques based on Locking SIB (LSIB) have been proposed. One such very effective technique makes use of Security Linear Feedback Shift Register (SLFSR) along with LSIB. The SLFSR obfuscates the scan chain information from the attacker and hence makes the brute-force attack against LSIB ineffective.In this work, it is shown that the SLFSR based Locking SIB is vulnerable to side-channel attacks. A power analysis attack along with known-plaintext attack is used to determine the IJTAG network structure. First, the known-plaintext attack is used to retrieve the SLFSR design information. This information is further used along with power analysis attack to determine the exact length of the scan chain which in turn breaks the whole security scheme. Further, a countermeasure is proposed to prevent the aforementioned hybrid attack.
NotesISSN: 1942-9401
DOI10.1109/IOLTS56730.2022.9897172
Citation Keykumar_attacking_2022