2006
DOI: 10.1109/tcad.2005.862745
|View full text |Cite
|
Sign up to set email alerts
|

Secure Scan: A Design-for-Test Architecture for Crypto Chips

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
97
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 197 publications
(97 citation statements)
references
References 9 publications
0
97
0
Order By: Relevance
“…As already mentioned in the introduction, design-fortestability circuitry such as test points and scan chains, may establish a new channel through which the attacker can access protected data [26]. This is especially dangerous if DFT mechanisms are inserted in the end of the design process by DFT engineers who are not fully aware which parts of the circuit are sensitive.…”
Section: Hardware Security Versus Dft and Bistmentioning
confidence: 99%
“…As already mentioned in the introduction, design-fortestability circuitry such as test points and scan chains, may establish a new channel through which the attacker can access protected data [26]. This is especially dangerous if DFT mechanisms are inserted in the end of the design process by DFT engineers who are not fully aware which parts of the circuit are sensitive.…”
Section: Hardware Security Versus Dft and Bistmentioning
confidence: 99%
“…Then before returning again to the functional mode the circuit is again reset so that no data insertion can be done using the scan path. In [4], the authors proposed to isolate the registers containing confidential data from the scan chain, and they require a global reset when switching between user mode and test mode. Both of these solutions require modification of the test protocol.…”
Section: A Protocol Levelmentioning
confidence: 99%
“…It is then necessary to add dedicated protection to ensure that the scan path is not activated during user mode. In [4], the authors propose to add data integrity logic control to the signals driving the MKR so that they detect any fault or brute attack leading to scan activation during the user mode. In [3], the authors identify the scan-enable signal as a high-risk signal since it drives the scan function of each scanned flip-flop.…”
Section: B Scan Chain-level Protectionmentioning
confidence: 99%
See 2 more Smart Citations