On Attacking IJTAG Architecture based on Locking SIB with Security LFSR.
Gaurav KumarAnjum RiazYamuna PrasadSatyadev AhlawatPublished in: IOLTS (2022)
Keyphrases
- information security
- security architecture
- random number generator
- management system
- intrusion detection
- real time
- security requirements
- statistical databases
- distributed multimedia
- security mechanisms
- security issues
- directory service
- application level
- network architecture
- network security
- software architecture
- database systems
- security policies
- security analysis
- cyber security
- formal model
- security level
- communication protocols
- access control
- highly distributed
- peer to peer