2014 19th IEEE European Test Symposium (ETS) 2014
DOI: 10.1109/ets.2014.6847798
|View full text |Cite
|
Sign up to set email alerts
|

Test-mode-only scan attack using the boundary scan chain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…6 to illustrate how Rule 1 can help recover missing bits in RK (i,4) . In this example, RK (4,1) and RK (5,1) have 4 bits missing and RK (4,4) has 5 bits missing. We apply Rule 1 as shown in line 7 and derive with the partially known RK (4,1) , RK (5,1) and RK (4,4) .…”
Section: (2) Restoration From Partial Information In Trace Buffermentioning
confidence: 99%
See 2 more Smart Citations
“…6 to illustrate how Rule 1 can help recover missing bits in RK (i,4) . In this example, RK (4,1) and RK (5,1) have 4 bits missing and RK (4,4) has 5 bits missing. We apply Rule 1 as shown in line 7 and derive with the partially known RK (4,1) , RK (5,1) and RK (4,4) .…”
Section: (2) Restoration From Partial Information In Trace Buffermentioning
confidence: 99%
“…In this example, RK (4,1) and RK (5,1) have 4 bits missing and RK (4,4) has 5 bits missing. We apply Rule 1 as shown in line 7 and derive with the partially known RK (4,1) , RK (5,1) and RK (4,4) . After some bit-manipulation, (4,4) by using sbox lookup table (Rule 1) we get sbox mapping from a 32-bit word to another 32-bit word in line 12∼13.…”
Section: (2) Restoration From Partial Information In Trace Buffermentioning
confidence: 99%
See 1 more Smart Citation
“…Our future work will focus on contemporary scan architectures where a test stimulus decompressor and a response compactor reside on the scan path. We have already made some progress on attacks using compactor [20] and boundary scan chains [21]. The technique we present in this paper is readily applicable on ICs that enable debug and diagnostics with a bypass of such advanced DFT features.…”
Section: Conclusion and Ongoing Workmentioning
confidence: 99%
“…Test-mode-only attacks [23,24,25] that can be implemented only under the test mode are deemed to be more risky attacks. Such attacks mainly focus on boundary scan design, in which each primary input (PI) is equipped with a boundary scan cell.…”
Section: Introductionmentioning
confidence: 99%