2013 IFIP/IEEE 21st International Conference on Very Large Scale Integration (VLSI-SoC) 2013
DOI: 10.1109/vlsi-soc.2013.6673281
|View full text |Cite
|
Sign up to set email alerts
|

New scan-based attack using only the test mode

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 39 publications
(16 citation statements)
references
References 5 publications
0
16
0
Order By: Relevance
“…DIPs rule out incorrect keys utilizing the output corruptibility of the miter circuit constructed using locked design and activated design. For sequential designs, it is assumed that an IC's internal states can be accessed and controlled via scan chains to [59] Internal States Scan encryption [45], DOS [51] Resetting Attack [46] Internal Secrets LCSS [48], DOS [51], Lock & Key [60], Scan encryption [45] Flushing Attack [47] Bit-role Identification Combinational Function Recovery [54] Functionality DOS [51] SAT Attack [4] Obfuscation Key…”
Section: Vulnerabilities Of the Dftmentioning
confidence: 99%
“…DIPs rule out incorrect keys utilizing the output corruptibility of the miter circuit constructed using locked design and activated design. For sequential designs, it is assumed that an IC's internal states can be accessed and controlled via scan chains to [59] Internal States Scan encryption [45], DOS [51] Resetting Attack [46] Internal Secrets LCSS [48], DOS [51], Lock & Key [60], Scan encryption [45] Flushing Attack [47] Bit-role Identification Combinational Function Recovery [54] Functionality DOS [51] SAT Attack [4] Obfuscation Key…”
Section: Vulnerabilities Of the Dftmentioning
confidence: 99%
“…In [7], a test-mode-only attack has been proposed in order to cope with the chosen plaintext strategy described in [4]. In this attack, plaintexts are applied by scanned-in bit streams.…”
Section: ) Scan Attacksmentioning
confidence: 99%
“…For instance, scanning out the scan chain content of a crypto-processor after one-round execution in functional mode permits to retrieve part of the used secret key. Several attacks ( [4], [5], [6] and [7]) on the Advanced Encryption Standard (AES) [8], called differential scan attacks, have been proposed in the literature.…”
Section: Introductionmentioning
confidence: 99%
“…Such an interface can allow the attacker to recover unencrypted images of the device firmware. Moreover, by identifying the location of particular registers within a scan chain, it is possible to recover the values stored within particular registers at runtime [20]. …”
Section: Identifying Shift-registers and Scan Chainsmentioning
confidence: 99%