2020 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE) 2020
DOI: 10.23919/date48585.2020.9116197
|View full text |Cite
|
Sign up to set email alerts
|

DynUnlock: Unlocking Scan Chains Obfuscated using Dynamic Keys

Abstract: Outsourcing in semiconductor industry opened up venues for faster and cost-effective chip manufacturing. However, this also introduced untrusted entities with malicious intent, to steal intellectual property (IP), overproduce the circuits, insert hardware Trojans, or counterfeit the chips. Recently, a defense is proposed to obfuscate the scan access based on a dynamic key that is initially generated from a secret key but changes in every clock cycle. This defense can be considered as the most rigorous defense … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…DOS [74] and Dyn-EFF [35], are in the better condition. However, recent studies on the possibility of recovering PRNG/LFSR structure describe in both scanSAT [21] and DynUnlock [77] reveals the vulnerability of these solutions.…”
Section: Discussion and Opportunitiesmentioning
confidence: 99%
See 3 more Smart Citations
“…DOS [74] and Dyn-EFF [35], are in the better condition. However, recent studies on the possibility of recovering PRNG/LFSR structure describe in both scanSAT [21] and DynUnlock [77] reveals the vulnerability of these solutions.…”
Section: Discussion and Opportunitiesmentioning
confidence: 99%
“…So, if the adversary could recover the seed of the PRNG, the generated key sequence would be revealed. Hence, similar to the ScanSAT, a new attack called DynUnlock [77] introduces a similar approach to show how it is possible to find the seed of the PRNG in EFF-Dyn.…”
Section: E Dynunlock Attack: Breaking Dynamic Encrypt Flip-flopmentioning
confidence: 99%
See 2 more Smart Citations
“…While DisORC demonstrates resilience against oracle-guided attacks, it is only applied at the gate-level for a locked netlist. Scan locking techniques [18], [19], [20] which insert key-driven logic on scan paths are also shown to be vulnerable to modeling-based attacks [21], [22].…”
Section: B Functional Mode Isolationmentioning
confidence: 99%