2021
DOI: 10.1109/access.2021.3080257
|View full text |Cite
|
Sign up to set email alerts
|

From Cryptography to Logic Locking: A Survey on the Architecture Evolution of Secure Scan Chains

Abstract: The availability of access to Integrated Circuits' scan chain is an inevitable requirement of modern ICs for testability/debugging purposes. However, leaving access to the scan chain OPEN resulted in numerous security threats on ICs. It raises challenging concerns particularly when the secret asset, like secret information, is placed within the chip, such as the keys of cryptographic algorithms, or similarly logic obfuscation key. So, to combat these threats, numerous secure scan chain architectures have been … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(1 citation statement)
references
References 73 publications
0
1
0
Order By: Relevance
“…1(b)) [42]. Thus, limiting scan chain access is an effective approach to combat existing threats that make the problem more complex [43]. Also, the explicit declaration of external secrecy is crucial to successfully setting up and applying a de-obfuscation attack.…”
Section: I/o Query-based De-obfuscation: Combinational Vs Sequentialmentioning
confidence: 99%
“…1(b)) [42]. Thus, limiting scan chain access is an effective approach to combat existing threats that make the problem more complex [43]. Also, the explicit declaration of external secrecy is crucial to successfully setting up and applying a de-obfuscation attack.…”
Section: I/o Query-based De-obfuscation: Combinational Vs Sequentialmentioning
confidence: 99%