2012 International SoC Design Conference (ISOCC) 2012
DOI: 10.1109/isocc.2012.6407063
|View full text |Cite
|
Sign up to set email alerts
|

Dynamically changeable secure scan architecture against scan-based side channel attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
20
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(20 citation statements)
references
References 6 publications
0
20
0
Order By: Relevance
“…As a result, countermeasures for scan attacks are no longer secure in the more generous threat model. Certain scan attack countermeasures rely on scan chain authentication [14], [30], [31], [32]. These countermeasures can be circumvented by having access to a reverse-engineered netlist, as the on-chip logic that implements secure scan can also be reverse-engineered to bypass authentication.…”
Section: Scansat Versus Scan Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, countermeasures for scan attacks are no longer secure in the more generous threat model. Certain scan attack countermeasures rely on scan chain authentication [14], [30], [31], [32]. These countermeasures can be circumvented by having access to a reverse-engineered netlist, as the on-chip logic that implements secure scan can also be reverse-engineered to bypass authentication.…”
Section: Scansat Versus Scan Attacksmentioning
confidence: 99%
“…Scan obfuscation/masking defenses Scan chain authentication[30],[31], State dependent scan flip-flop based scan (SDSFF)[32] RE-vulnerable Flipped scan[39], XOR scan[40], double feedback XOR scan[41] RE-vulnerable…”
mentioning
confidence: 99%
“…In [45], the scan patterns/responses are decrypted/encrypted at each scan input/output, respectively, which is conducted by highly efficient and secure block cipher at each scan port. But these countermeasures are defeated by resetting attack [46] and flushing attack [47]. By resetting the scan cells or flushing the scan chain with the known patterns, the fixed inverted bits [46] and modified bits [47] in the obfuscated scan chain can be identified so that the plaintext can be deciphered.…”
Section: Vulnerabilities Of the Dftmentioning
confidence: 99%
“…DIPs rule out incorrect keys utilizing the output corruptibility of the miter circuit constructed using locked design and activated design. For sequential designs, it is assumed that an IC's internal states can be accessed and controlled via scan chains to [59] Internal States Scan encryption [45], DOS [51] Resetting Attack [46] Internal Secrets LCSS [48], DOS [51], Lock & Key [60], Scan encryption [45] Flushing Attack [47] Bit-role Identification Combinational Function Recovery [54] Functionality DOS [51] SAT Attack [4] Obfuscation Key…”
Section: Vulnerabilities Of the Dftmentioning
confidence: 99%
“…In [18], some bits in the chain are dynamically inverted depending on previous output values of selected flip-flops, while [19] inserts random inverters before the shift input on some flops to make extraction of information from cryptographic hardware more difficult. In [20] scan data is also selectively changed, but with XORs. Note that some of these methods don't necessarily prevent access to data; they simply make it more difficult to decode and use.…”
Section: Previous Workmentioning
confidence: 99%