2017 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) 2017
DOI: 10.1109/dft.2017.8244434
|View full text |Cite
|
Sign up to set email alerts
|

Preventing scan-based side-channel attacks through key masking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…This would in turn deliver a much more comprehensive protection against not only scan attacks but also reverse engineering, IP piracy, Trojan insertion, etc. The techniques in [23], [24] aim at protecting the scan access into the crypto cores based on a weaker threat model that assumes access to a working chip only; however, they are easily breakable in the threat model defined in this and all other logic locking papers where the locked netlist is also assumed to be available to an attacker.…”
Section: Security Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…This would in turn deliver a much more comprehensive protection against not only scan attacks but also reverse engineering, IP piracy, Trojan insertion, etc. The techniques in [23], [24] aim at protecting the scan access into the crypto cores based on a weaker threat model that assumes access to a working chip only; however, they are easily breakable in the threat model defined in this and all other logic locking papers where the locked netlist is also assumed to be available to an attacker.…”
Section: Security Comparisonmentioning
confidence: 99%
“…On the other hand, attempts at thwarting SAT attack focused on restricting unauthorized scan access. This branches down to either obfuscating the scan chains [20], [21], or blocking the scan chain access entirely [22], [23], [24]. In [20], Karmakar et al proposed obfuscating the stimuli and test patterns by inserting key gates into the scan chain.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation