{"id":"https://openalex.org/W2903329932","doi":"https://doi.org/10.3390/fi10120121","title":"Exploiting JTAG and Its Mitigation in IOT: A Survey","display_name":"Exploiting JTAG and Its Mitigation in IOT: A Survey","publication_year":2018,"publication_date":"2018-12-03","ids":{"openalex":"https://openalex.org/W2903329932","doi":"https://doi.org/10.3390/fi10120121","mag":"2903329932"},"language":"en","primary_location":{"id":"doi:10.3390/fi10120121","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi10120121","pdf_url":"https://www.mdpi.com/1999-5903/10/12/121/pdf?version=1543981676","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/10/12/121/pdf?version=1543981676","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055646547","display_name":"Gopal Vishwakarma","orcid":"https://orcid.org/0000-0002-5440-9149"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Gopal Vishwakarma","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Texas at San Antonio, San Antonio, TX 78249, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Texas at San Antonio, San Antonio, TX 78249, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100602693","display_name":"Wonjun Lee","orcid":"https://orcid.org/0000-0001-5286-6541"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wonjun Lee","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Texas at San Antonio, San Antonio, TX 78249, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Texas at San Antonio, San Antonio, TX 78249, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5055646547"],"corresponding_institution_ids":["https://openalex.org/I45438204"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":4.2041,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.94922686,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"10","issue":"12","first_page":"121","last_page":"121"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.8227028846740723},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8122342824935913},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7795877456665039},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6579834222793579},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5325350761413574},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5243057012557983},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.4432673752307892},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.43275201320648193},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.42953407764434814},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.35466137528419495},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3513999581336975},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2250426709651947},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1566801369190216}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.8227028846740723},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8122342824935913},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7795877456665039},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6579834222793579},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5325350761413574},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5243057012557983},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.4432673752307892},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.43275201320648193},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.42953407764434814},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.35466137528419495},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3513999581336975},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2250426709651947},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1566801369190216},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/fi10120121","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi10120121","pdf_url":"https://www.mdpi.com/1999-5903/10/12/121/pdf?version=1543981676","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:gam:jftint:v:10:y:2018:i:12:p:121-:d:187439","is_oa":false,"landing_page_url":"https://www.mdpi.com/1999-5903/10/12/121/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:956fd633040f42d092b4058a19219506","is_oa":true,"landing_page_url":"https://doaj.org/article/956fd633040f42d092b4058a19219506","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 10, Iss 12, p 121 (2018)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/1999-5903/10/12/121/","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3390/fi10120121","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/fi10120121","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi10120121","pdf_url":"https://www.mdpi.com/1999-5903/10/12/121/pdf?version=1543981676","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2903329932.pdf","grobid_xml":"https://content.openalex.org/works/W2903329932.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W156132949","https://openalex.org/W1605172130","https://openalex.org/W2019553608","https://openalex.org/W2032373771","https://openalex.org/W2052912197","https://openalex.org/W2077699686","https://openalex.org/W2078353671","https://openalex.org/W2091195302","https://openalex.org/W2095507076","https://openalex.org/W2116374153","https://openalex.org/W2316485656","https://openalex.org/W2405941171","https://openalex.org/W2507684432","https://openalex.org/W2733765803","https://openalex.org/W2767601850","https://openalex.org/W2951530623","https://openalex.org/W4254533984","https://openalex.org/W6634881901","https://openalex.org/W6635673271","https://openalex.org/W6697056889","https://openalex.org/W6729217316"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W4328003561","https://openalex.org/W2906845177","https://openalex.org/W4200107511","https://openalex.org/W2891427086","https://openalex.org/W1968625315"],"abstract_inverted_index":{"Nowadays,":[0],"companies":[1,14],"are":[2,41,126],"heavily":[3],"investing":[4],"in":[5,48,133,199,232],"the":[6,44,49,107,130,200],"development":[7],"of":[8,10,55,67,73,110,118,149,212],"\u201cInternet":[9],"Things(IoT)\u201d":[11],"products.":[12],"These":[13],"usually":[15],"and":[16,83,156,178,217],"obviously":[17],"hunt":[18],"for":[19],"lucrative":[20],"business":[21],"models.":[22],"Currently,":[23],"each":[24,63,91],"person":[25],"owns":[26],"at":[27],"least":[28],"3\u20134":[29],"devices":[30,56,112,125,214],"(such":[31],"as":[32,172,183],"mobiles,":[33],"personal":[34,74],"computers,":[35],"Google":[36],"Assistant,":[37],"Alexa,":[38],"etc.)":[39],"that":[40,57,90,141],"connected":[42],"to":[43,77,129,145,164,176,192,224],"Internet":[45],"24/7.":[46],"However,":[47,106],"future,":[50],"there":[51],"might":[52],"be":[53,59,94,170,190],"hundreds":[54],"will":[58,100],"constantly":[60],"online":[61,216],"behind":[62],"person,":[64],"keeping":[65],"track":[66],"body":[68],"health,":[69],"banking":[70],"transactions,":[71],"status":[72],"devices,":[75,180],"etc.":[76],"make":[78,193],"one\u2019s":[79,98],"life":[80,99],"more":[81],"efficient":[82],"streamlined.":[84],"Thus,":[85],"it":[86],"is":[87,113,137],"very":[88],"crucial":[89],"device":[92],"should":[93],"highly":[95],"secure":[96],"since":[97],"become":[101],"dependent":[102],"on":[103,116,151],"these":[104],"devices.":[105],"current":[108],"security":[109],"IoT":[111,230],"mainly":[114],"focused":[115],"resiliency":[117],"device.":[119],"In":[120],"addition,":[121],"less":[122],"complex":[123],"node":[124],"easily":[127],"accessible":[128],"public":[131],"resulting":[132],"higher":[134],"vulnerability.":[135],"JTAG":[136,167,210],"an":[138],"IEEE":[139],"standard":[140],"has":[142,157],"been":[143,158],"defined":[144,182],"test":[146],"proper":[147],"mounting":[148],"components":[150],"PCBs":[152],"(printed":[153],"circuit":[154],"boards)":[155],"extensively":[159],"used":[160,171,191],"by":[161],"PCB":[162],"manufacturers":[163],"date.":[165],"This":[166,187,205],"interface":[168],"can":[169,189,228],"a":[173,184,233],"backdoor":[174],"entry":[175],"access":[177],"exploit":[179],"also":[181,218],"physical":[185],"attack.":[186],"attack":[188],"products":[194,231],"malfunction,":[195],"modify":[196],"data,":[197],"or,":[198],"worst":[201],"case,":[202],"stop":[203],"working.":[204],"paper":[206],"reviews":[207,219],"previous":[208],"successful":[209],"exploitations":[211],"well-known":[213],"operating":[215],"some":[220],"proposed":[221],"possible":[222],"solutions":[223],"see":[225],"how":[226],"they":[227],"affect":[229],"broader":[234],"sense.":[235]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
