2011 IEEE International Symposium on Hardware-Oriented Security and Trust 2011
DOI: 10.1109/hst.2011.5955005
|View full text |Cite
|
Sign up to set email alerts
|

New security threats against chips containing scan chain structures

Abstract: Insertion of scan chains is the most common technique to ensure observability and controllability of sequential elements in an IC. However, when the chip deals with secret information, the scan chain can be used as back door for accessing secret (or hidden) information, and thus jeopardize the overall security. Several scan-based attacks on cryptographic functions have been described and showed the need for secure scan implementations. These attacks assume a single scan chain. However the conception of large d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
40
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 52 publications
(40 citation statements)
references
References 13 publications
0
40
0
Order By: Relevance
“…In [1], the authors claim that identification of these KFFs in the scan design is crucial for successful recovery of the encryption key. However, this has been contradicted in later works presented by Da Rolt et al [4], [5].…”
Section: Previous Workmentioning
confidence: 84%
See 1 more Smart Citation
“…In [1], the authors claim that identification of these KFFs in the scan design is crucial for successful recovery of the encryption key. However, this has been contradicted in later works presented by Da Rolt et al [4], [5].…”
Section: Previous Workmentioning
confidence: 84%
“…Although scan-chain Designfor-Test (DFT) offers the highest testability, they are prone to scan-based side channel leakages which may help an intruder to perform a non-invasive attack on secure chips to extract secret information such as cryptographic keys from secure hardware implementations. In fact, there are works available in the literature which exploit this property, and they are referred to as scan-based side channel attacks [3], [4], [5]. However, these works do not consider any X-tolerant or X-masking logic which is widely used in industrial test compression schemes, and gravely affects the applicability and running time of these attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Performance of the scan-path countermeasure CTL platform has been used to evaluate the [11] countermeasure. It is meant for scan-path protection and thus the attack has been mounted to discover k using the [15] methodology but applied in the ECC core, as described by A. Das in [16].…”
Section: A Performance Of the Platformmentioning
confidence: 99%
“…Once the unit starts he can interrupt it at any iteration of the Montgomery algorithm, see Figure 3, switch to test mode and scan-out the content of Q 0 and Q 1 . He also assumes that scan-paths are compressed, as described in [15], and therefore uses the parity evaluation of the output bits as a feedback for carrying out the attack.…”
Section: A Performance Of the Platformmentioning
confidence: 99%
“…To achieve better productivity SoC designers are forced to reuse design modules from external sources of IP of which security is not well verified. To prevent the security failure in one module from being cascaded through test subsystems of chips, security enhanced test access mechanisms are addressed to escape from the threat posed by untrustworthy cores [14,15]. A protection scheme is proposed for serial JTAG channels which are prone to be downgraded by any threat of a malicious chip in a JTAG chain [16].…”
Section: Introductionmentioning
confidence: 99%