2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) 2018
DOI: 10.1109/asianhost.2018.8607168
|View full text |Cite
|
Sign up to set email alerts
|

Bias PUF based Secure Scan Chain Design

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…V. DISCUSSION AND CONCLUSION Among the scan locking solutions that follow the same threat model used in logic locking, the only defenses that our attack cannot circumvent are those that incorporate cryptographic functions [7], [8] or PUF structures [19] to generate dynamic keys. Our attack cannot model such modules into their combinational logic equivalent.…”
Section: Resultsmentioning
confidence: 99%
“…V. DISCUSSION AND CONCLUSION Among the scan locking solutions that follow the same threat model used in logic locking, the only defenses that our attack cannot circumvent are those that incorporate cryptographic functions [7], [8] or PUF structures [19] to generate dynamic keys. Our attack cannot model such modules into their combinational logic equivalent.…”
Section: Resultsmentioning
confidence: 99%
“…In [49], a Bias PUF based secure scan design is proposed. The main idea of this design is to mask input and output data of the scan chain when unauthorized user uses it.…”
Section: J Bias Puf Based Scanmentioning
confidence: 99%