2015
DOI: 10.1109/tcad.2015.2398423
|View full text |Cite
|
Sign up to set email alerts
|

Novel Test-Mode-Only Scan Attack and Countermeasure for Compression-Based Scan Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(19 citation statements)
references
References 14 publications
0
19
0
Order By: Relevance
“…For this reason, countermeasures have been developed, based on resetting the scan chains when the circuit is switched from test mode to functional mode. S. Ali et al [11] conceived a scan attack on AES that is entirely executed in test mode. In test mode, the AES inputs are set through the scan chain, as well as the observation of the round register value.…”
Section: Scan Attacksmentioning
confidence: 99%
“…For this reason, countermeasures have been developed, based on resetting the scan chains when the circuit is switched from test mode to functional mode. S. Ali et al [11] conceived a scan attack on AES that is entirely executed in test mode. In test mode, the AES inputs are set through the scan chain, as well as the observation of the round register value.…”
Section: Scan Attacksmentioning
confidence: 99%
“…The presented technique is as well compared with other scheme protecting cryptographic chips against scan-based attacks, such as MKR [28], mode switching reset [27], secure DFT method [29], SOSD-128 [38], DOSD-128 [38], DOS [41], SIE [45], and FTSL-128 [40]. The comparison results are given in Table 3.…”
Section: Performance Analysismentioning
confidence: 99%
“…The attack model is developed to thwart the secure techniques based on mode switching reset. The authors also extend their attack model to decompressor-based scan architectures [27].…”
Section: Introductionmentioning
confidence: 99%
“…Test-mode-only attacks [23,24,25] that can be implemented only under the test mode are deemed to be more risky attacks. Such attacks mainly focus on boundary scan design, in which each primary input (PI) is equipped with a boundary scan cell.…”
Section: Introductionmentioning
confidence: 99%