2019
DOI: 10.1109/access.2019.2925237
|View full text |Cite
|
Sign up to set email alerts
|

Scan Chain Based Attacks and Countermeasures: A Survey

Abstract: Scan chains increase the testability but decrease security. Attackers may use scan chains to launch attacks to obtain sensitive information, which poses serious security threats. The scan chain-based attacks contain two steps: 1) scan data obtaining, including mode switching obtaining method and test mode only obtaining method, and 2) scan data analysis, including data mapping analysis method and signature analysis method. To prevent these attacks, various secure scan designs have been proposed. These designs … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 49 publications
0
10
0
Order By: Relevance
“…A recent survey paper [29] lists various scan obfuscation/masking defenses. In this section, we categorize these defenses into three classes as shown in Table 7: (i) REvulnerable: those that are vulnerable to any basic reverse engineering (RE) attack; e.g., the position of added gates identified via RE can be used to compromise the defense; ScanSAT does not need to be applied.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…A recent survey paper [29] lists various scan obfuscation/masking defenses. In this section, we categorize these defenses into three classes as shown in Table 7: (i) REvulnerable: those that are vulnerable to any basic reverse engineering (RE) attack; e.g., the position of added gates identified via RE can be used to compromise the defense; ScanSAT does not need to be applied.…”
Section: Discussionmentioning
confidence: 99%
“…(iii) ScanSAT-resilient: those that are resilient to our attack ScanSAT but at the expense of other implications such as hindered debug, etc. Details about these defenses can be found in [29].…”
Section: Discussionmentioning
confidence: 99%
“…In this survey paper, we will provide a holistic overview of this breed of countermeasures in terms of security, test time/complexity, and overhead. Since securing the scan chain was first originated in the presence of cryptographic engines, there exist some survey papers that review and evaluate such techniques [52].…”
Section: E the Survey Overviewmentioning
confidence: 99%
“…Existing scan-based side-channel attacks can be categorized into mode-switching attacks [15]- [21] and testmode-only attacks [22]- [27].…”
Section: A Scan-based Side-channel Attacksmentioning
confidence: 99%
“…A full-scan design simplifies automatic test-pattern generation (ATPG). However, scan chain can also be exploited as a side-channel to gain access to the intermediate computation results of selected functional unit of a cryptographic core for secret key extraction [15]- [27]. When the FSM state registers are included in the scan chain, the outputs of the FSM state registers are reachable, and their inputs are controllable.…”
Section: Introductionmentioning
confidence: 99%