Subject Area
Computer Engineering, Electrical, Electronics Engineering
Abstract
More and more instruments are now integrated on the chip for testing, debugging, monitoring, and post-silicon validation. IEEE Std 1687 (IJTAG) provides efficient access to these instruments. At the same time, techniques for an attacker to steal important data through the IJTAG network have also emerged. To improve the security of the IJTAG network and especially the communication between software and a board, others have proposed a security access protocol with several possible implementations based on an information hiding method. For example, one version of this previously published bidirectional authentication access protocol uses multiple templates to embed keys to improve security. Others have considered the implementation in the context of power analysis attacks. In this thesis, several previously proposed methods are combined and additional modifications to the implementation are made with the goal of increasing the cost of an attack.
Degree Date
Summer 2024
Document Type
Thesis
Degree Name
M.S.
Department
Computer Science and Engineering
Advisor
Jennifer Dworak
Second Advisor
Theodore Manikas
Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial 4.0 License
Recommended Citation
Wei, Haoran, "New Improvements to Defend Against Power Analysis Attacks in IJTAG Access Protocol" (2024). Computer Science and Engineering Theses and Dissertations. 41.
https://scholar.smu.edu/engineering_compsci_etds/41