Paul et al., 2021 - Google Patents
SILVerIn: Systematic integrity verification of printed circuit board using JTAG infrastructurePaul et al., 2021
View PDF- Document ID
- 5242563106271836010
- Author
- Paul S
- Bhunia S
- Publication year
- Publication venue
- ACM Journal on Emerging Technologies in Computing Systems (JETC)
External Links
Snippet
A printed circuit board (PCB) provides necessary mechanical support to an electronic system and acts as a platform for connecting electronic components. Counterfeiting and in- field tampering of PCBs have become significant security concerns in the semiconductor …
- 238000005259 measurement 0 abstract description 52
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
- G01R31/3185—Reconfiguring for testing, e.g. LSSD, partitioning
- G01R31/318533—Reconfiguring for testing, e.g. LSSD, partitioning using scanning techniques, e.g. LSSD, Boundary Scan, JTAG
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Guin et al. | Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain | |
Subramanyan et al. | Evaluating the security of logic encryption algorithms | |
Rostami et al. | Hardware security: Threat models and metrics | |
Jain et al. | TAAL: Tampering attack on any key-based logic locked circuits | |
Harrison et al. | On malicious implants in PCBs throughout the supply chain | |
Paul et al. | SILVerIn: Systematic integrity verification of printed circuit board using JTAG infrastructure | |
Shi et al. | Golden gates: A new hybrid approach for rapid hardware trojan detection using testing and imaging | |
Oriero et al. | Survey on recent counterfeit IC detection techniques and future research directions | |
Zheng et al. | SeMIA: Self-similarity-based IC integrity analysis | |
Hennessy et al. | JTAG-based robust PCB authentication for protection against counterfeiting attacks | |
US11480614B2 (en) | Side-channel signature based PCB authentication using JTAG architecture and a challenge-response mechanism | |
Asadizanjani et al. | Physical assurance | |
Lv et al. | Trusted integrated circuits: The problem and challenges | |
Vosatka | Introduction to hardware trojans | |
Mosavirik et al. | ScatterVerif: Verification of electronic boards using reflection response of power distribution network | |
Ahmed et al. | Quantifiable assurance: from IPs to platforms | |
Zhang et al. | On database-free authentication of microelectronic components | |
Hoque et al. | Trust issues in microelectronics: The concerns and the countermeasures | |
Zhang et al. | A novel authentication methodology to detect counterfeit PCB using PCB trace-based ring oscillator | |
Trippel et al. | T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing | |
Akkaya et al. | Secure chip odometers using intentional controlled aging | |
Karabacak et al. | Detection of malicious hardware components in mobile platforms | |
Iyengar et al. | Hardware trojans and piracy of PCBs | |
Zhang et al. | DARPT: defense against remote physical attack based on TDC in multi-tenant scenario | |
Xiao et al. | Circuit timing signature (CTS) for detection of counterfeit integrated circuits |