Scan-based design-for-testability, which improves access and thus the test quality, is highly vulnerable to scan attack. While in-field test is enabled through the scan design to provide debug capabilities, an attacker can leverage the test mode to leak the secret key of the chip. The scan attack can be thwarted by a simple defense that resets the data upon a switch from the normal mode to the test mode. We proposed a new class of scan attack in [15] using only the test mode of a chip, circumventing this defense. In this book chapter we extend our earlier work by introducing case studies to explain this new attack in greater detail. Furthermore, we study the effectiveness of existing countermeasures to thwart the attack and propose a new input corruption countermeasure that requires a smaller area overhead compared to the existing countermeasures.
CITATION STYLE
Ali, S. S., Saeed, S. M., Sinanoglu, O., & Karri, R. (2015). New scan-based attack using only the test mode and an input corruption countermeasure. In IFIP Advances in Information and Communication Technology (Vol. 461, pp. 48–68). Springer New York LLC. https://doi.org/10.1007/978-3-319-23799-2_3
Mendeley helps you to discover research relevant for your work.