New scan-based attack using only the test mode and an input corruption countermeasure

5Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Scan-based design-for-testability, which improves access and thus the test quality, is highly vulnerable to scan attack. While in-field test is enabled through the scan design to provide debug capabilities, an attacker can leverage the test mode to leak the secret key of the chip. The scan attack can be thwarted by a simple defense that resets the data upon a switch from the normal mode to the test mode. We proposed a new class of scan attack in [15] using only the test mode of a chip, circumventing this defense. In this book chapter we extend our earlier work by introducing case studies to explain this new attack in greater detail. Furthermore, we study the effectiveness of existing countermeasures to thwart the attack and propose a new input corruption countermeasure that requires a smaller area overhead compared to the existing countermeasures.

Cite

CITATION STYLE

APA

Ali, S. S., Saeed, S. M., Sinanoglu, O., & Karri, R. (2015). New scan-based attack using only the test mode and an input corruption countermeasure. In IFIP Advances in Information and Communication Technology (Vol. 461, pp. 48–68). Springer New York LLC. https://doi.org/10.1007/978-3-319-23799-2_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free