2018
DOI: 10.1049/iet-ifs.2017.0440
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability modelling of crypto‐chips against scan‐based attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(9 citation statements)
references
References 23 publications
(58 reference statements)
0
9
0
Order By: Relevance
“…To protect a scan-enabled chip against scan-based attacks, we should consider the fact that different parts of the chip have different contributions in a successful scan-based attack. Vulnerability modelling [26] of a crypto-chip against scan-based attacks revealed that not all parts of a chip have the same contribution in a successful scan-based attack. To have an efficient attack tolerance mechanism, we need to consider this fact.…”
Section: Preliminaries and Backgroundsmentioning
confidence: 99%
See 4 more Smart Citations
“…To protect a scan-enabled chip against scan-based attacks, we should consider the fact that different parts of the chip have different contributions in a successful scan-based attack. Vulnerability modelling [26] of a crypto-chip against scan-based attacks revealed that not all parts of a chip have the same contribution in a successful scan-based attack. To have an efficient attack tolerance mechanism, we need to consider this fact.…”
Section: Preliminaries and Backgroundsmentioning
confidence: 99%
“…To have an efficient attack tolerance mechanism, we need to consider this fact. For example, a gate-level vulnerability model proposed in [26] is based on the fact that preventing the first step of a structural scan-based attack, i.e. extracting the input to scan cell(s) mapping, would save the ground of the crypto-chip against structural scan-based attacks.…”
Section: Preliminaries and Backgroundsmentioning
confidence: 99%
See 3 more Smart Citations