A suite of IEEE 1687 benchmark networks

A Tšertov, A Jutman, S Devadze… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
The saturation of the IJTAG concept and its approval as the IEEE 1687 standard in 2014 has
generated a wave of research activities and created demand for a set of appropriate and …

A survey on security threats and countermeasures in IEEE test standards

E Valea, M Da Silva, G Di Natale, ML Flottes… - IEEE Design & …, 2019 - hal.science
The growth in complexity of Integrated Circuits (IC) is supported, amongst other factors, by
the development of standardized test infrastructures. The feasibility of both end …

Self-test and diagnosis for self-aware systems

MA Kochte, HJ Wunderlich - IEEE Design & Test, 2017 - ieeexplore.ieee.org
Self-testing hardware has a long tradition as a complement to manufacturing testing based
on test stimuli and response analysis. Today, it is a mature field and many complex SoCs …

Digital-to-analog hardware Trojan attacks

M Elshamy, G Di Natale, A Sayed… - … on Circuits and …, 2021 - ieeexplore.ieee.org
We propose a Hardware Trojan (HT) attack for analog circuits with its key characteristic
being that it cannot be prevented or detected in the analog domain. The HT attack works in …

Echeloned IJTAG data protection

S Kan, J Dworak, JG Dunham - 2016 IEEE Asian Hardware …, 2016 - ieeexplore.ieee.org
This paper presents a novel IJTAG-based data protection method that utilizes stream ciphers
and IJTAG topology. The method protects IJTAG data with encryption. It further imposes …

Increasing IJTAG bandwidth and managing security through parallel locking-SIBs

S Gupta, A Crouch, J Dworak… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
The number of on-chip embedded instruments required for testing, debugging, and
monitoring integrated circuits (ICs) has increased dramatically. The IEEE 1687 (IJTAG) …

Multi-access filtering for privacy-preserving fog computing

K Gai, L Zhu, M Qiu, K Xu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The interest in fog computing is growing, including in traditionally conservative and sensitive
areas such as military and governments. This is partly driven by the interconnectivity of our …

Hardware Root of Trust for SSN-basedDFT Ecosystems

J Rajski, M Trawka, J Tyszer… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
A hardware root of trust (RoT) is the foundation on which all secure operations of a circuit
depend, including those related to DFT. Despite many countermeasures aimed at facing …

Run-time hardware Trojan detection in analog and mixed-signal ICs

A Pavlidis, E Faehn, MM Louërat… - 2022 IEEE 40th VLSI …, 2022 - ieeexplore.ieee.org
Hardware Trojan (HT) insertion is a major security threat for electronic components that
demand a high trust level. Several HT attack mechanisms have been demonstrated to date …

Specification and verification of security in reconfigurable scan networks

MA Kochte, M Sauer, LR Gomez… - 2017 22nd IEEE …, 2017 - ieeexplore.ieee.org
A large amount of on-chip infrastructure, such as design-for-test, debug, monitoring, or
calibration, is required for the efficient manufacturing, debug, and operation of complex …