[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Paul et al., 2021 - Google Patents

SILVerIn: Systematic integrity verification of printed circuit board using JTAG infrastructure

Paul et al., 2021

View PDF
Document ID
5242563106271836010
Author
Paul S
Bhunia S
Publication year
Publication venue
ACM Journal on Emerging Technologies in Computing Systems (JETC)

External Links

Snippet

A printed circuit board (PCB) provides necessary mechanical support to an electronic system and acts as a platform for connecting electronic components. Counterfeiting and in- field tampering of PCBs have become significant security concerns in the semiconductor …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • G01R31/3185Reconfiguring for testing, e.g. LSSD, partitioning
    • G01R31/318533Reconfiguring for testing, e.g. LSSD, partitioning using scanning techniques, e.g. LSSD, Boundary Scan, JTAG
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled

Similar Documents

Publication Publication Date Title
Guin et al. Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain
Subramanyan et al. Evaluating the security of logic encryption algorithms
Rostami et al. Hardware security: Threat models and metrics
Jain et al. TAAL: Tampering attack on any key-based logic locked circuits
Harrison et al. On malicious implants in PCBs throughout the supply chain
Paul et al. SILVerIn: Systematic integrity verification of printed circuit board using JTAG infrastructure
Shi et al. Golden gates: A new hybrid approach for rapid hardware trojan detection using testing and imaging
Oriero et al. Survey on recent counterfeit IC detection techniques and future research directions
Zheng et al. SeMIA: Self-similarity-based IC integrity analysis
Hennessy et al. JTAG-based robust PCB authentication for protection against counterfeiting attacks
US11480614B2 (en) Side-channel signature based PCB authentication using JTAG architecture and a challenge-response mechanism
Asadizanjani et al. Physical assurance
Lv et al. Trusted integrated circuits: The problem and challenges
Vosatka Introduction to hardware trojans
Mosavirik et al. ScatterVerif: Verification of electronic boards using reflection response of power distribution network
Ahmed et al. Quantifiable assurance: from IPs to platforms
Zhang et al. On database-free authentication of microelectronic components
Hoque et al. Trust issues in microelectronics: The concerns and the countermeasures
Zhang et al. A novel authentication methodology to detect counterfeit PCB using PCB trace-based ring oscillator
Trippel et al. T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing
Akkaya et al. Secure chip odometers using intentional controlled aging
Karabacak et al. Detection of malicious hardware components in mobile platforms
Iyengar et al. Hardware trojans and piracy of PCBs
Zhang et al. DARPT: defense against remote physical attack based on TDC in multi-tenant scenario
Xiao et al. Circuit timing signature (CTS) for detection of counterfeit integrated circuits