2017
DOI: 10.1109/tifs.2016.2613847
|View full text |Cite
|
Sign up to set email alerts
|

Static and Dynamic Obfuscations of Scan Data Against Scan-Based Side-Channel Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
52
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(52 citation statements)
references
References 33 publications
0
52
0
Order By: Relevance
“…As a result, countermeasures for scan attacks are no longer secure in the more generous threat model. Certain scan attack countermeasures rely on scan chain authentication [14], [30], [31], [32]. These countermeasures can be circumvented by having access to a reverse-engineered netlist, as the on-chip logic that implements secure scan can also be reverse-engineered to bypass authentication.…”
Section: Scansat Versus Scan Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, countermeasures for scan attacks are no longer secure in the more generous threat model. Certain scan attack countermeasures rely on scan chain authentication [14], [30], [31], [32]. These countermeasures can be circumvented by having access to a reverse-engineered netlist, as the on-chip logic that implements secure scan can also be reverse-engineered to bypass authentication.…”
Section: Scansat Versus Scan Attacksmentioning
confidence: 99%
“…Scan obfuscation/masking defenses Scan chain authentication[30],[31], State dependent scan flip-flop based scan (SDSFF)[32] RE-vulnerable Flipped scan[39], XOR scan[40], double feedback XOR scan[41] RE-vulnerable…”
mentioning
confidence: 99%
“…There are different types of IP cores at various design levels, as identification information can be inserted at any design level as a part of the IP core for protection [21,22]. FPGAs are programmable integrated circuits, and the process to insert identification information in such a circuit as a target is more complicated than that of traditional multimedia—text, software, among others.…”
Section: Preliminariesmentioning
confidence: 99%
“…So, the watermarking implementation is different. 21 In Figure 2, Alice should first generate the watermark sequence with her own signature using the watermark generator. To ensure the security, two secret keys are generated, respectively, as the public key KEY1 and the private key KEY2.…”
Section: Ecc-based Ip Watermarking Algorithmmentioning
confidence: 99%