Author :
Buskey, R.F. ; Frosik, Barbara B.
Abstract :
In this paper, we consider a particular aspect of an effort to define trusted computing solutions. One of the hardware features of an embedded device is the JTAG (joint test action group) port that allows easy access to a processor for debugging purposes. This access is a potential security threat in a high assurance environment. This paper presents a solution of a protected JTAG. The purpose of providing protected JTAG, as part of the trusted computing platform, is to prevent access to private and confidential information by unauthorized users and yet allow debugging functions. The presented solution introduces different levels of access. The level of user´s access is based on the user´s permissions
Keywords :
authorisation; integrated circuit testing; microprocessor chips; program debugging; debugging function; information access; joint test action group; projected JTAG; security threat; trusted computing platform; Access protocols; Circuits; Debugging; Hardware; Information security; Internet; Mathematical model; Protection; Registers; Testing;
Conference_Titel :
Parallel Processing Workshops, 2006. ICPP 2006 Workshops. 2006 International Conference on
Conference_Location :
Columbus, OH
Print_ISBN :
0-7695-2637-3
DOI :
10.1109/ICPPW.2006.65