2014 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS) 2014
DOI: 10.1109/apccas.2014.7032842
|View full text |Cite
|
Sign up to set email alerts
|

Secure scan design using improved random order and its evaluations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Scan chains are accessible for testing purposes, yet the information from the scan chain combined with other side-channel leakage presents a great security threat. Several techniques have been developed to secure the scan chain by controlling the accessibility and content of the chain such that an attacker cannot easily gain access to the scan chain and the information extracted would not be useful for breaking the hardware system [Fan et al 2014;Oya et al 2014].…”
Section: Maximizementioning
confidence: 99%
“…Scan chains are accessible for testing purposes, yet the information from the scan chain combined with other side-channel leakage presents a great security threat. Several techniques have been developed to secure the scan chain by controlling the accessibility and content of the chain such that an attacker cannot easily gain access to the scan chain and the information extracted would not be useful for breaking the hardware system [Fan et al 2014;Oya et al 2014].…”
Section: Maximizementioning
confidence: 99%
“…Otherwise, the work order is unpredictable. Similarly, in [38] and [39], a Random Order Scan (ROS) design is proposed. The scan chain is also divided into subchains, and the connection order of these sub-chains can be dynamically changed.…”
Section: F Sub-chains Based Scanmentioning
confidence: 99%
“…Although attackers can get access to the scan chain, the effective information cannot be obtained from the obfuscated data any more. Specifically, in this paper, eleven common secure scan designs using this strategy is introduced: Flipped Scan [24], XOR Scan [25], Double Feedback XOR Scan [26], rXOR Scan [27], State Dependent Scan Flip-Flop [28], [29], Dynamically Obfuscated Scan [30], [31], Test Key Integrated Scan [32]- [35], Sub-chains based Scan [36]- [39], Static and Dynamic Obfuscation of Scan [40], [41], and Partial Secure Scan [42], [43]. The second is scan input/output restriction.…”
Section: Introductionmentioning
confidence: 99%