A suite of IEEE 1687 benchmark networks
The saturation of the IJTAG concept and its approval as the IEEE 1687 standard in 2014 has
generated a wave of research activities and created demand for a set of appropriate and …
generated a wave of research activities and created demand for a set of appropriate and …
A survey on security threats and countermeasures in IEEE test standards
The growth in complexity of Integrated Circuits (IC) is supported, amongst other factors, by
the development of standardized test infrastructures. The feasibility of both end …
the development of standardized test infrastructures. The feasibility of both end …
Self-test and diagnosis for self-aware systems
MA Kochte, HJ Wunderlich - IEEE Design & Test, 2017 - ieeexplore.ieee.org
Self-testing hardware has a long tradition as a complement to manufacturing testing based
on test stimuli and response analysis. Today, it is a mature field and many complex SoCs …
on test stimuli and response analysis. Today, it is a mature field and many complex SoCs …
Digital-to-analog hardware Trojan attacks
We propose a Hardware Trojan (HT) attack for analog circuits with its key characteristic
being that it cannot be prevented or detected in the analog domain. The HT attack works in …
being that it cannot be prevented or detected in the analog domain. The HT attack works in …
Echeloned IJTAG data protection
This paper presents a novel IJTAG-based data protection method that utilizes stream ciphers
and IJTAG topology. The method protects IJTAG data with encryption. It further imposes …
and IJTAG topology. The method protects IJTAG data with encryption. It further imposes …
Increasing IJTAG bandwidth and managing security through parallel locking-SIBs
The number of on-chip embedded instruments required for testing, debugging, and
monitoring integrated circuits (ICs) has increased dramatically. The IEEE 1687 (IJTAG) …
monitoring integrated circuits (ICs) has increased dramatically. The IEEE 1687 (IJTAG) …
Multi-access filtering for privacy-preserving fog computing
The interest in fog computing is growing, including in traditionally conservative and sensitive
areas such as military and governments. This is partly driven by the interconnectivity of our …
areas such as military and governments. This is partly driven by the interconnectivity of our …
Hardware Root of Trust for SSN-basedDFT Ecosystems
A hardware root of trust (RoT) is the foundation on which all secure operations of a circuit
depend, including those related to DFT. Despite many countermeasures aimed at facing …
depend, including those related to DFT. Despite many countermeasures aimed at facing …
Run-time hardware Trojan detection in analog and mixed-signal ICs
A Pavlidis, E Faehn, MM Louërat… - 2022 IEEE 40th VLSI …, 2022 - ieeexplore.ieee.org
Hardware Trojan (HT) insertion is a major security threat for electronic components that
demand a high trust level. Several HT attack mechanisms have been demonstrated to date …
demand a high trust level. Several HT attack mechanisms have been demonstrated to date …
Specification and verification of security in reconfigurable scan networks
A large amount of on-chip infrastructure, such as design-for-test, debug, monitoring, or
calibration, is required for the efficient manufacturing, debug, and operation of complex …
calibration, is required for the efficient manufacturing, debug, and operation of complex …