Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > A Learning-based Approach to Secure JTAG against Unseen Scan-based Attacks
Publication

Publications

A Learning-based Approach to Secure JTAG against Unseen Scan-based Attacks

Title
A Learning-based Approach to Secure JTAG against Unseen Scan-based Attacks
Type
Article in International Conference Proceedings Book
Year
2016
Authors
Ren, XL
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. View Authenticus page Without ORCID
Blanton, RD
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Vítor Grade Tavares
(Author)
FEUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Conference proceedings International
Pages: 541-546
IEEE-Computer-Society Annual Symposium on VLSI (ISVLSI)
Pittsburgh, PA, JUL 11-13, 2016
Other information
Authenticus ID: P-00K-X96
Abstract (EN): Security is becoming an essential problem for integrated circuits (ICs). Various attacks, such as reverse engineering and dumping on-chip data, have been reported to undermine IC security. IEEE 1149.1, also known as JTAG, is primarily used for IC manufacturing test but inevitably provides a "backdoor" that can be exploited to attack ICs. Encryption has been used extensively as an effective mean to protect ICs through authentication, but a few weaknesses subsist, such as key leakage. Signature-based techniques ensure security using a database that includes known attacks, but fail to detect attacks that are not contained by the database. To overcome these drawbacks, a two-layer learning-based protection scheme is proposed. Specifically, the scheme monitors the execution of JTAG instructions and uses support vector machines (SVM) to identify abnormal instruction sequences. The use of machine learning enables the detection of unseen attacks without the need for key-based authentication. The experiments based on the OpenSPARC T2 platform demonstrate that the proposed scheme improves the accuracy of detecting unseen attacks by 50% on average when compared to previous work.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 6
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same authors

Detection of Illegitimate Access to JTAG via Statistical Learning in Chip (2015)
Article in International Conference Proceedings Book
Ren, XL; Vítor Grade Tavares; Blanton, RD
Recommend this page Top
Copyright 1996-2025 © Faculdade de Direito da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-07-16 at 08:30:00 | Privacy Policy | Personal Data Protection Policy | Whistleblowing