Protecting test port of embedded systems to keep data safe

نویسنده

  • Benjamin Dauphin
چکیده

Security is a growing concern for embedded system designers. Therefore a wide range of protection mechanisms have been developed in the recent years to counter malicious attacks. This work gives an overview and compares existing solutions concerning the protection of the test access port. Potential improvements are then proposed over some of the previous works. Keywords—security, JTAG, IEEE 1687, DfT, test access port

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

Forensic imaging of embedded systems using JTAG (boundary-scan)

This paper describes how to use JTAG (JTAG: Joint Test Action Group, also called boundary-scan) for producing a forensic image (image: an one-on-one copy of data found on an exhibit) of an embedded system. A JTAG test access port is normally used for testing printed circuit boards or for debugging embedded software. The method described in this paper uses a JTAG test access port to access memor...

متن کامل

Comparison of Early Results and Complications between Multi-and Single-Port Sleeve Gastrectomy: A Randomized Clinical Study

AbstractBackground: In recent years, laparoscopic sleeve gastrectomy (LSG) has become more acceptable for obese patients. Single-port sleeve gastrectomy (SPSG) is more popular since each abdominal incision carries the risk of bleeding, hernia, and internal organ injury as well as exponentially affecting cosmesis. This cross-sectional study aimed at comparing multi-port sleeve gastrectomy (MPSG)...

متن کامل

Isomorphism between Linear Codes and Arithmetic Codes for Safe Data Processing in Embedded Software Systems

We present a transformation rule to convert linear codes into arithmetic codes. Linear codes are usually used for error detection and correction in broadcast and storage systems. In contrast, arithmetic codes are very suitable for protection of software processing in computer systems. This paper shows how to transform linear codes protecting the data stored in a computer system into arithmetic ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016