Hardware Security and Trust 2017
DOI: 10.1007/978-3-319-44318-8_7
|View full text |Cite
|
Sign up to set email alerts
|

Manufacturing Testing and Security Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…This can be done by physically connecting the output of the scan controller to a pull-up element or a controllable source. The former is based on the Saw Bow method [19], where the connecting wire crosses the sawing line of the wafer. The latter is depicted in Fig.…”
Section: A Scan Controllermentioning
confidence: 99%
“…This can be done by physically connecting the output of the scan controller to a pull-up element or a controllable source. The former is based on the Saw Bow method [19], where the connecting wire crosses the sawing line of the wafer. The latter is depicted in Fig.…”
Section: A Scan Controllermentioning
confidence: 99%
“…The strong pull-up resistance sets a logic value on the line when the sawing line is intact. When the dies are sawed, the weak pull-down resistance sets the opposite value on the line [11].…”
Section: ) Wafer Testingmentioning
confidence: 99%
“…In comparison with previous survey papers [52]- [54], this paper has two main contributions. Firstly, from the perspective of scan chain based attacks, this paper introduces the two phases, scan data obtaining and scan data analysis respectively to detail the attack process.…”
Section: Introductionmentioning
confidence: 99%