首页> 外文会议>IEEE International Symposium on Hardware-Oriented Security and Trust >Anti-tamper JTAG TAP design enables DRM to JTAG registers and P1687 on-chip instruments
【24h】

Anti-tamper JTAG TAP design enables DRM to JTAG registers and P1687 on-chip instruments

机译:防篡改JTAG Tap设计使DRM能够为JTAG寄存器和P1687片上仪器

获取原文

摘要

This paper describes an anti-tamper JTAG Tap design which uses SHA256 secure hash and a true random number generator (TRNG) to create a low gate overhead challenge/response based access system for IC test and on-chip internals. The system may be used to enable 1149.1 TAP instructions or may control access to an IEEE P1687 on-chip instrument. The TAP owner (manufacturer of the IC) may then use DRM (Digital Rights Management) based JTAG software to manage which end users have access to the TAP or TAP accessible areas of the IC. IEEE 1149.1/JTAG was intended to enable access to pins and on-chip infrastructure IP (sometimes referred to as 'instruments') to make life easier for test engineers and reduce costs. Unfortunately, JTAG can also be used by the 'evil-doers' and makes their life easier when hacking electronic products. IEEE 1149.1/JTAG has been for used in hacking or snooping hardware platforms with the intent to reverse engineer the design. This reverse engineering may be for the purpose of cloning an electronic product or for the purpose of making compatible peripherals. Neither of these is in the best interest of the OEM. IEEE 1149.1/JTAG may also be used for installing Trojan software programs or Trojan FPGA designs enabling the capturing of user passwords and other system details. Consider how easy it is to re-program FPGAs and update embedded systems today via JTAG. Then consider the ramifications if a critical embedded system such as a downed UAV - Unmanned Aerial Vehicle - had its FPGAs or firmware reprogrammed by an insurgent. If they can capture a UAV or 'drone' video feed, it certainly isn't that farfetched to consider it.
机译:本文介绍了一种防篡改JTAG TAP设计,它使用SHA256安全散列和真正随机数发生器(TRNG)来创建基于低门开销挑战/基于IC测试和片上内部的接入系统。该系统可用于启用1149.1点击指令或可以控制对IEEE P1687片上仪器的访问。然后,TIP所有者(IC的制造商)可以使用基于DRM(数字版权管理)的JTAG软件来管理哪些最终用户可以访问IC的TAP或点击访问区域。 IEEE 1149.1 / JTAG旨在启用针对销钉和片上基础设施IP(有时称为“仪器”),以使测试工程师更轻松地实现生命并降低成本。不幸的是,JTAG也可以被“邪恶的行者”使用,并在黑客电子产品时使他们的生活更轻松。 IEEE 1149.1 / JTAG一直用于在黑客或侦听硬件平台中使用,以旨在逆向工程设计。该逆向工程可以用于克隆电子产品或用于制造兼容外围设备的目的。这些都不是OEM的最佳兴趣。 IEEE 1149.1 / JTAG还可用于安装特洛伊木马软件程序或特洛伊木马FPGA设计,从而捕获用户密码和其他系统详细信息。考虑通过JTAG重新编程FPGA并更新嵌入式系统是多么容易。然后,如果诸如滴眼的无人机 - 无人驾驶飞行器等关键嵌入式系统 - 将其FPGA或固件被叛乱重新编程,请考虑分支。如果他们可以捕获无人机或“无人机”视频源,那么它肯定不是考虑它的比力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号