2019 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE) 2019
DOI: 10.23919/date.2019.8715172
|View full text |Cite
|
Sign up to set email alerts
|

On Secure Data Flow in Reconfigurable Scan Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 13 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…However, the key is known to the SoC integrator or the test infrastructure IP provider who inserts the HT and, thereby, these methods can only be used against external threats. Another type of prevention method is to study dependencies among cores in a RSN so as to detect possible security and trust violations and, thereafter, build a new secure network [30]. Again, this cannot prevent HT insertion given our threat model.…”
Section: Discussion On Countermeasuresmentioning
confidence: 99%
“…However, the key is known to the SoC integrator or the test infrastructure IP provider who inserts the HT and, thereby, these methods can only be used against external threats. Another type of prevention method is to study dependencies among cores in a RSN so as to detect possible security and trust violations and, thereafter, build a new secure network [30]. Again, this cannot prevent HT insertion given our threat model.…”
Section: Discussion On Countermeasuresmentioning
confidence: 99%