共查询到17条相似文献,搜索用时 93 毫秒
1.
2.
3.
4.
5.
6.
7.
8.
9.
主要介绍了目前世界上主要流行的一种Flash加载技术——利用JTAG技术加载Flash。文章分为3个部分。首先描述了JTAG加载Flash的原理。然后对JTAG加载Flash的优点做了说明。最后对实验性能做了详细分析。 相似文献
10.
11.
12.
Amitabh Das Jean Da Rolt Santosh Ghosh Stefaan Seys Sophie Dupuis Giorgio Di Natale Marie-Lise Flottes Bruno Rouzeyre Ingrid Verbauwhede 《Journal of Electronic Testing》2013,29(2):193-209
The standard IEEE 1149.1 (Test Access Port and Boundary-Scan Architecture, also known as JTAG port) provides a useful interface for embedded systems development, debug, and test. In an 1149.1-compatible integrated circuit, the JTAG port allows the circuit to be easily accessed from the external world, and even to control and observe the internal scan chains of the circuit. However, the JTAG port can be also exploited by attackers to mount several cryptographic attacks. In this paper we propose a novel architecture that implements a secure JTAG interface. Our JTAG scheme allows for mutual authentication between the device and the tester. In contrast to previous work, our scheme uses provably secure asymmetric-key based authentication and verification protocols. The complete scheme is implemented in hardware and integrated with the standard JTAG interface. Detailed area and timing results are also presented. 相似文献
13.
一种遵循IEEE 1149.1标准的可测试性设计结构 总被引:7,自引:0,他引:7
IEEE ll49.1(也称JTAG)是支持芯片边界扫描的国际标准,提供了统一的测试访问端口。如今,它已成为芯片必不可少的一种“开销”。本文通过定制JTAG逻辑,以求用最少的开销,最简单灵活的方式来管理各种DFT逻辑。 相似文献
14.
介绍了TMS320LF240xA内部FALSH的特性和优点,标准JTAG接口各个主要引脚的定义,通过并口将PC与目标板上的边界扫描器件(标准JTAG接口)相连,烧写TMS320LF240xA内部FLASH的新方法。同时,文章论述了烧写TMS320LF240xA内部FLASH的闪存编程命令、烧写FLASH时的步骤和注意事项,给出了CMD文件中变量的定义,以及将const section加载进程序存储器的方法和示例程序。 相似文献
15.
基于串口的DSP软件下载设计与实现 总被引:3,自引:0,他引:3
张小莉 《信息安全与通信保密》2012,(1):70-71
在以DSP为CPU的嵌入式系统软件开发中,常常需要对目标机软件进行升级更新,一般的方法是利用仿真器通过DSP上的JTAG端口对目标机软件进行调试后烧写,这种方法操作复杂,常用在软件开发阶段。文中设计了一种利用计算机串口与目标机串口实现对DSP软件下载的方法,并且对软件下载过程和软件加载过程进行了比较详细的设计说明。这种方法不需要仿真器和JTAG端口即可方便地实现目标机的软件下载更新。 相似文献
16.
JTAG (Joint Test Access Group) is a powerful tool for the embedded system development environments. The features of JTAG,
however, can be exploited by malicious users as a backdoor for launching attacks, an approach which now constitutes a major
threat in the domain of device hacking. To deny unauthenticated users access to the features of JTAG port, this paper proposes
a novel JTAG security mechanism. The proposed solution uses authentication based on credentials to achieve improved security
and usability over existing solutions. Our approach is easily applicable to all standard JTAG environments because its structure
is designed to be independent from the application environment. Further, the approach has lower implementation cost than encryption/decryption-based
solutions since only hash and XOR calculations are employed in its authentication protocol. The security of the proposed mechanism
has been verified through analysis against all forms of expected attacks, and its functionality is demonstrated with a real-life
implementation. 相似文献
17.
为了实现对那些仅有标准打印接口的陈旧设备的信息化改造。本文在分析并口通信、设备与打印机交互信息原理的基础上,设计了一款基于隔离电路的并口设备数据获取系统。该系统可以在不影响设备与打印机正常工作的前提下,截获设备与打印机的通信信息,通过这些信息还原设备的原始打印内容。实际应用表明,该系统达到了设计要求,实现了信息的有效共享和使用。 相似文献