New Scan-Based Attack Using Only the Test Mode and an Input Corruption Countermeasure - VLSI-SoC: At the Crossroads of Emerging Trends
Conference Papers Year : 2015

New Scan-Based Attack Using Only the Test Mode and an Input Corruption Countermeasure

Sk Subidh Ali
  • Function : Author
  • PersonId : 990366
Ozgur Sinanoglu
  • Function : Author
  • PersonId : 990368
Ramesh Karri
  • Function : Author
  • PersonId : 990369

Abstract

Scan-based design-for-testability, which improves access and thus the test quality, is highly vulnerable to scan attack. While in-field test is enabled through the scan design to provide debug capabilities, an attacker can leverage the test mode to leak the secret key of the chip. The scan attack can be thwarted by a simple defense that resets the data upon a switch from the normal mode to the test mode. We proposed a new class of scan attack in [15] using only the test mode of a chip, circumventing this defense. In this book chapter we extend our earlier work by introducing case studies to explain this new attack in greater detail. Furthermore, we study the effectiveness of existing countermeasures to thwart the attack and propose a new input corruption countermeasure that requires a smaller area overhead compared to the existing countermeasures.
Fichier principal
Vignette du fichier
367527_1_En_3_Chapter.pdf (626.46 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01380298 , version 1 (12-10-2016)

Licence

Identifiers

Cite

Sk Subidh Ali, Samah Mohamed Saeed, Ozgur Sinanoglu, Ramesh Karri. New Scan-Based Attack Using Only the Test Mode and an Input Corruption Countermeasure. 21th IFIP/IEEE International Conference on Very Large Scale Integration - System on a Chip (VLSI-SoC), Oct 2013, Istanbul, Turkey. pp.48-68, ⟨10.1007/978-3-319-23799-2_3⟩. ⟨hal-01380298⟩
225 View
250 Download

Altmetric

Share

More