Subject Area

Computer Engineering, Electrical, Electronics Engineering

Abstract

More and more instruments are now integrated on the chip for testing, debugging, monitoring, and post-silicon validation. IEEE Std 1687 (IJTAG) provides efficient access to these instruments. At the same time, techniques for an attacker to steal important data through the IJTAG network have also emerged. To improve the security of the IJTAG network and especially the communication between software and a board, others have proposed a security access protocol with several possible implementations based on an information hiding method. For example, one version of this previously published bidirectional authentication access protocol uses multiple templates to embed keys to improve security. Others have considered the implementation in the context of power analysis attacks. In this thesis, several previously proposed methods are combined and additional modifications to the implementation are made with the goal of increasing the cost of an attack.

Degree Date

Summer 2024

Document Type

Thesis

Degree Name

M.S.

Department

Computer Science and Engineering

Advisor

Jennifer Dworak

Second Advisor

Theodore Manikas

Creative Commons License

Creative Commons Attribution-Noncommercial 4.0 License
This work is licensed under a Creative Commons Attribution-Noncommercial 4.0 License

Available for download on Sunday, August 09, 2026

Share

COinS