2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) 2014
DOI: 10.1109/hst.2014.6855585
|View full text |Cite
|
Sign up to set email alerts
|

New scan attacks against state-of-the-art countermeasures and DFT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…If an attacker can access the state register through scan design, the intermediate result of just one round is available for him. Thus, the cipher key (also called as user key) can be exposed through mathematical derivation based on intermediate encryption results [22,23]. There are three possible attack ways based on standard boundary scan design.…”
Section: Proposed Secure Scan Test Schemementioning
confidence: 99%
See 1 more Smart Citation
“…If an attacker can access the state register through scan design, the intermediate result of just one round is available for him. Thus, the cipher key (also called as user key) can be exposed through mathematical derivation based on intermediate encryption results [22,23]. There are three possible attack ways based on standard boundary scan design.…”
Section: Proposed Secure Scan Test Schemementioning
confidence: 99%
“…Test-mode-only attacks [23,24,25] that can be implemented only under the test mode are deemed to be more risky attacks. Such attacks mainly focus on boundary scan design, in which each primary input (PI) is equipped with a boundary scan cell.…”
Section: Introductionmentioning
confidence: 99%
“…(iii) Partitioning the key cells into AES bytes. (iv) Recovering the key from pre-computed signature table [14][15][16].…”
Section: Tmo Attacksmentioning
confidence: 99%
“…Researchers have also explored scan-chain-based attacks on test infrastructures included by major electronic design automation (EDA) vendors Mentor Graphics, Cadence and Synopsys [11][12][13]. Furthermore, the TMO attacks on AES crypto-hardware mentioned in [14][15][16]. Differential scan attack (DSA) and TMO attack work on the same principle: exploiting differential property of cryptocipher and calculating Hamming distance on output differences to retrieve secret key of the cipher.…”
Section: Introductionmentioning
confidence: 99%
“…Our future work will focus on contemporary scan architectures where a test stimulus decompressor and a response compactor reside on the scan path. We have already made some progress on attacks using compactor [20] and boundary scan chains [21]. The technique we present in this paper is readily applicable on ICs that enable debug and diagnostics with a bypass of such advanced DFT features.…”
Section: Conclusion and Ongoing Workmentioning
confidence: 99%