JTAG Architecture with Multi Level Security
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 1, Issue 1
Abstract
For in–circuit testing and debugging JTAG (Joint Test Access Group) is one of the most powerful standard architecture of DFT (Design For Testability). But JTAG can also act as a tool for hacking and hence makes the devices vulnerable for attacks. This paper presents a Security mechanism for JTAG and hence prevents the unauthorized users from accessing the private and confidential information of a device. This method is highly compatible with the IEEE 1149.1 standard and requires no modification in the Intellectual Property of an IC. In this paper the standard JTAG Architecture with enhanced security mechanism is described using VHDL.
Authors and Affiliations
Pooja Ajay Kumar
Performance Measurement of WLAN Based On Medium Access Control for Wirelessly Connected Stations
Abstract: This paper is mainly focuses on the Medium Access Control (MAC) sublayer of the IEEE 802.11 standard for Wireless Local Area Network (WLAN) and delay measurement among the network and also compare of the traffi...
Remote Android Assistant with Global Positioning System Tracking
The paper describes a method which binds a web application and an Android mobile application, to,provide remote exploration services. A remote exploration system has been developed using web server,database, and an Andro...
A web-based decision support system for lower back pain diagnosis
Abstract: In the era of science and technology, computer is the most spirited constituent in our today’s health care sector with variety of facilities. The use of Artificial Intelligent (AI), Knowledge Management, is the...
Numerical Solution of unsteady gravity flow of power-law fluids through a porous medium
Abstract: In this paper, we present a numerical study of the rheological behaviour effect of non-Newtonian, power-law fluids on the unsteady gravity flow through a porous medium. The governing equations are derived&...
A survey of Stemming Algorithms for Information Retrieval
Abstract:Now a day’s text documents is advancing over internet, e-mails and web pages. As the use of internetis exponentially growing, the need of massive data storage is increasing. Normally many of the documentscontain...