JTAG Architecture with Multi Level Security

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 1, Issue 1

Abstract

 For in–circuit testing and debugging JTAG (Joint Test Access Group) is one of the most powerful standard architecture of DFT (Design For Testability). But JTAG can also act as a tool for hacking and hence makes the devices vulnerable for attacks. This paper presents a Security mechanism for JTAG and hence prevents the unauthorized users from accessing the private and confidential information of a device. This method is highly compatible with the IEEE 1149.1 standard and requires no modification in the Intellectual Property of an IC. In this paper the standard JTAG Architecture with enhanced security mechanism is described using VHDL.

Authors and Affiliations

Pooja Ajay Kumar

Keywords

Related Articles

 A Survey on Privacy Preserving Data Mining Techniques

Abstract: Data mining is the extraction of the important patterns or information from large amount of data, which is used for decision making in future work. But the process of data collection and data dissemination may...

 Comparative Performance Analysis of SALT and PEPPER Noise Removal

 Abstract: Noise is an important factor which when get added to an image reduces its quality and appearance.So in order to enhance the image qualities, it has to be removed with preserving the textural information a...

Iris recognition by using blood vessel segmentation

Abstract: Among the various biometrics technologies, iris recognition is the most reliable and accurate biometric identification system available. In this paper a novel framework for recognizing and identifying iris is b...

Identifiying the Authorised User by Typing Speed Comparison

Abstract: Computers have become a ubiquitous part of the modern society. Online attacks on companies resulted in the shutdown of their networks and compromised the passwords and personal information of millions of users....

Overview of Hacking

Abstract: Hacking and hacker are terms that generally tend to have negative effect on people. These days, largely due to popular media most people wrongly think of hackers as computer criminal and the person who doing so...

Download PDF file
  • EP ID EP146321
  • DOI -
  • Views 103
  • Downloads 0

How To Cite

Pooja Ajay Kumar (2012).  JTAG Architecture with Multi Level Security. IOSR Journals (IOSR Journal of Computer Engineering), 1(1), 54-59. https://europub.co.uk/articles/-A-146321