Fine-grained access management in reconfigurable scan networks
R Baranowski, MA Kochte… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Modern very large scale integration designs incorporate a high amount of instrumentation
that supports post-silicon validation and debug, volume test and diagnosis, as well as in …
that supports post-silicon validation and debug, volume test and diagnosis, as well as in …
A suite of IEEE 1687 benchmark networks
The saturation of the IJTAG concept and its approval as the IEEE 1687 standard in 2014 has
generated a wave of research activities and created demand for a set of appropriate and …
generated a wave of research activities and created demand for a set of appropriate and …
A survey on security threats and countermeasures in IEEE test standards
The growth in complexity of Integrated Circuits (IC) is supported, amongst other factors, by
the development of standardized test infrastructures. The feasibility of both end …
the development of standardized test infrastructures. The feasibility of both end …
Securing IEEE 1687-2014 standard instrumentation access by LFSR key
H Liu, VD Agrawal - 2015 IEEE 24th Asian Test Symposium …, 2015 - ieeexplore.ieee.org
IEEE 1687-2014 Standard provides an effective method for accessing on-chip instruments
for testing, debugging and board configuration. The standard, however, causes a safety …
for testing, debugging and board configuration. The standard, however, causes a safety …
Specification and verification of security in reconfigurable scan networks
A large amount of on-chip infrastructure, such as design-for-test, debug, monitoring, or
calibration, is required for the efficient manufacturing, debug, and operation of complex …
calibration, is required for the efficient manufacturing, debug, and operation of complex …
Security against data-sniffing and alteration attacks in IJTAG
R Elnaggar, R Karri… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The IEEE Std. 1687 (IJTAG) facilitates access to on-chip instruments in complex system-on-
chip designs. However, a major security vulnerability in IJTAG has yet to be addressed …
chip designs. However, a major security vulnerability in IJTAG has yet to be addressed …
Formal verification of secure reconfigurable scan network infrastructure
Reconfigurable scan networks (RSN) as standardized by IEEE Std 1687 allow flexible and
efficient access to on-chip infrastructure for test and diagnosis, post-silicon validation …
efficient access to on-chip infrastructure for test and diagnosis, post-silicon validation …
Detecting and resolving security violations in reconfigurable scan networks
P Raiola, MA Kochte, A Atteya… - 2018 IEEE 24th …, 2018 - ieeexplore.ieee.org
Reconfigurable Scan Networks (RSNs) allow flexible access to embedded instruments for
post-silicon validation and debug or diagnosis. However, this scan infrastructure can also be …
post-silicon validation and debug or diagnosis. However, this scan infrastructure can also be …
Online prevention of security violations in reconfigurable scan networks
Modern systems-on-chip (SoC) designs are requiring more and more infrastructure for
validation, debug, volume test as well as in-field maintenance and repair. Reconfigurable …
validation, debug, volume test as well as in-field maintenance and repair. Reconfigurable …
Reliable health monitoring and fault management infrastructure based on embedded instrumentation and IEEE 1687
Semiconductor products manufactured with latest and emerging processes are increasingly
prone to wear out and aging. While the fault occurrence rate in such systems increases, the …
prone to wear out and aging. While the fault occurrence rate in such systems increases, the …