Proceedings of 2010 IEEE International Symposium on Circuits and Systems 2010
DOI: 10.1109/iscas.2010.5537859
|View full text |Cite
|
Sign up to set email alerts
|

State-dependent changeable scan architecture against scan-based side channel attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…This method has very high area overhead, furthermore, the operation of the mask function is not clearly discussed and we believe its testability drop is also high. In [15,16], a -SDSFF has been proposed to dynamically change data of the scan cells for scan chain obfuscation. This method needs a timing controller that is not considered in the security and testability measurements, in fact, if any intentional or natural fault occurs in the controller, the whole chip will lose its testability [17].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…This method has very high area overhead, furthermore, the operation of the mask function is not clearly discussed and we believe its testability drop is also high. In [15,16], a -SDSFF has been proposed to dynamically change data of the scan cells for scan chain obfuscation. This method needs a timing controller that is not considered in the security and testability measurements, in fact, if any intentional or natural fault occurs in the controller, the whole chip will lose its testability [17].…”
Section: Related Workmentioning
confidence: 99%
“…Although details of a hardware implementation of encryption algorithms may affect a success rate of the attack, e.g. whether the algorithm is implemented by pipeline or iterative architectures [9,10,14], the generality of attack helped attackers to break any type of implementation so far [9][10][11][12][13][14][15][16].…”
Section: Preliminaries and Backgroundsmentioning
confidence: 99%
See 2 more Smart Citations
“…In [17], the flip-flops only capture data if certain bits of the test vectors (hopefully don't care bits) are set to pre-defined values. In [18], some bits in the chain are dynamically inverted depending on previous output values of selected flip-flops, while [19] inserts random inverters before the shift input on some flops to make extraction of information from cryptographic hardware more difficult. In [20] scan data is also selectively changed, but with XORs.…”
Section: Previous Workmentioning
confidence: 99%