2017 22nd IEEE European Test Symposium (ETS) 2017
DOI: 10.1109/ets.2017.7968248
|View full text |Cite
|
Sign up to set email alerts
|

Scan chain encryption for the test, diagnosis and debug of secure circuits

Abstract: Scan attacks exploit facilities offered by scan chains to retrieve embedded secret data, in particular secret keys used in crypto-processors for encoding information in such a way that only knowledge of the secret key allows to access it. This paper presents a scan attack countermeasure based on the encryption of the scan chain content. The goal is to counteract the security threats and, at the same time, to preserve test efficiency, diagnosis and debugging abilities. We propose to use the secret-key managemen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 26 publications
(26 citation statements)
references
References 16 publications
(17 reference statements)
0
26
0
Order By: Relevance
“…DIPs rule out incorrect keys utilizing the output corruptibility of the miter circuit constructed using locked design and activated design. For sequential designs, it is assumed that an IC's internal states can be accessed and controlled via scan chains to [59] Internal States Scan encryption [45], DOS [51] Resetting Attack [46] Internal Secrets LCSS [48], DOS [51], Lock & Key [60], Scan encryption [45] Flushing Attack [47] Bit-role Identification Combinational Function Recovery [54] Functionality DOS [51] SAT Attack [4] Obfuscation Key…”
Section: Vulnerabilities Of the Dftmentioning
confidence: 99%
See 1 more Smart Citation
“…DIPs rule out incorrect keys utilizing the output corruptibility of the miter circuit constructed using locked design and activated design. For sequential designs, it is assumed that an IC's internal states can be accessed and controlled via scan chains to [59] Internal States Scan encryption [45], DOS [51] Resetting Attack [46] Internal Secrets LCSS [48], DOS [51], Lock & Key [60], Scan encryption [45] Flushing Attack [47] Bit-role Identification Combinational Function Recovery [54] Functionality DOS [51] SAT Attack [4] Obfuscation Key…”
Section: Vulnerabilities Of the Dftmentioning
confidence: 99%
“…Scan Encryption: A countermeasure against scan-based side channel attacks could be done through the encryption of the scan chain content [45]. These attacks use an efficient and secure block cipher placed at each scan port to decrypt/encrypt scan patterns/responses at each scan input/output, respectively.…”
Section: E Defense For Design-for-testabilitymentioning
confidence: 99%
“…The countermeasure proposed in [9] targets circuits embedding at least one crypto-core. We assume a tamperresistant memory to store secret-keys and a key management policy (no additional key management policy is required).…”
Section: Presentation Of Scan Chain Encryptionmentioning
confidence: 99%
“…The countermeasure described in [9] consists in using light block ciphers for scan encryption. Assuming a cryptoprocessor embedded with key management and storing, the same key storage present in the circuit under test is used to store the scan chain encryption key.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation