Skip to Main content Skip to Navigation
Conference papers

New Scan-Based Attack Using Only the Test Mode and an Input Corruption Countermeasure

Abstract : Scan-based design-for-testability, which improves access and thus the test quality, is highly vulnerable to scan attack. While in-field test is enabled through the scan design to provide debug capabilities, an attacker can leverage the test mode to leak the secret key of the chip. The scan attack can be thwarted by a simple defense that resets the data upon a switch from the normal mode to the test mode. We proposed a new class of scan attack in [15] using only the test mode of a chip, circumventing this defense. In this book chapter we extend our earlier work by introducing case studies to explain this new attack in greater detail. Furthermore, we study the effectiveness of existing countermeasures to thwart the attack and propose a new input corruption countermeasure that requires a smaller area overhead compared to the existing countermeasures.
Document type :
Conference papers
Complete list of metadata

Cited literature [20 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Wednesday, October 12, 2016 - 5:39:15 PM
Last modification on : Thursday, March 5, 2020 - 5:40:12 PM
Long-term archiving on: : Saturday, February 4, 2017 - 8:32:53 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Sk Ali, Samah Saeed, Ozgur Sinanoglu, Ramesh Karri. New Scan-Based Attack Using Only the Test Mode and an Input Corruption Countermeasure. 21th IFIP/IEEE International Conference on Very Large Scale Integration - System on a Chip (VLSI-SoC), Oct 2013, Istanbul, Turkey. pp.48-68, ⟨10.1007/978-3-319-23799-2_3⟩. ⟨hal-01380298⟩



Record views


Files downloads