COE215 DESIGN OF DIGITAL SYSTEMS AND COMPUTERS
MAPUA INSTITUTE OF TECHNOLOGY
JTAG has been widely adopted by manufacturing company because of its well-known standard mechanism for in-circuit board testing. Although it provides high controllability and observability, it also poses great security challenges.
Source: Image from "Boundary Scan Tutorial" by Dr. Ben Bennetts
Source: Kurt Rosenfeld and Ramesh Karri , Attack and Defenses for JTAG
Typical Deployment of JTAG is a chain of several devices in PCB
Source: Kurt Rosenfeld and Ramesh Karri , Attack and Defenses for JTAG
Conceptual Security Model
Source: Attack and Defenses for JTAG by Kurt Rosenfeld and Ramesh Karri
Source: Attack and Defenses for JTAG by Kurt Rosenfeld and Ramesh Karri
The attacker obtains secret data by sniffing the JTAG path
Source: Attack and Defenses for JTAG by Kurt Rosenfeld and Ramesh Karri
In a read-out attack, the attacker obtains an embedded secret by forcing test vectors onto the JTAG lines
Source: Attack and Defenses for JTAG by Kurt Rosenfeld and Ramesh Karri
In a test vector collection attack, which can be passive, the attacker obtains a copy of the test vectors and normal responses of a chip in the JTAG chain.
Source: Attack and Defenses for JTAG by Kurt Rosenfeld and Ramesh Karri
The attacker can intercept test vectors that are sent to another chip, and can send false responses to the tester.
Source: Attack and Defenses for JTAG by Kurt Rosenfeld and Ramesh Karri
Returns false responses to test
Source: Steven McNeil, Solving Today’s Design Security Concerns, 2012
Source: Using the Design Security Features in Altera FPGAs, 2015
Source: Joe Grand, Practical Secure Hardware Design for Embedded Systems, 2004
PAM is a framework of authentication module mostly used in Linux operating system and can also be implemented to embedded system projects.
PAM is a modular and flexible authentication management layer that sits between Linux applications and the native underlying authentication system.
PAM can be implemented with various applications without having to recompile the application when PAM configuration is changed.
Source: Kenneth Geisshirt, Pluggable Authentication Modules, 2007
Source: Kenneth Geisshirt, Pluggable Authentication Modules, 2007
Source: Kenneth Geisshirt, Pluggable Authentication Modules, 2007
PAM Framework Architecture
Source: Kenneth Geisshirt, Pluggable Authentication Modules, 2007
Source: Kenneth Geisshirt, Pluggable Authentication Modules, 2007
Source: Kenneth Geisshirt, Pluggable Authentication Modules, 2007
Source: http://www.tuxradar.com/content/how-pam-works
The idea of PAM can be used as a standard in design & implementation of SoC in the future.
As security evolves, so as the need for new authentication method. PAM provides the ease of changing authentication by using its modular functions.