Skip to Main content Skip to Navigation
Conference papers

New Scan-Based Attack Using Only the Test Mode and an Input Corruption Countermeasure

Abstract : Scan-based design-for-testability, which improves access and thus the test quality, is highly vulnerable to scan attack. While in-field test is enabled through the scan design to provide debug capabilities, an attacker can leverage the test mode to leak the secret key of the chip. The scan attack can be thwarted by a simple defense that resets the data upon a switch from the normal mode to the test mode. We proposed a new class of scan attack in [15] using only the test mode of a chip, circumventing this defense. In this book chapter we extend our earlier work by introducing case studies to explain this new attack in greater detail. Furthermore, we study the effectiveness of existing countermeasures to thwart the attack and propose a new input corruption countermeasure that requires a smaller area overhead compared to the existing countermeasures.
Document type :
Conference papers
Complete list of metadata

Cited literature [20 references]  Display  Hide  Download

https://hal.inria.fr/hal-01380298
Contributor : Hal Ifip <>
Submitted on : Wednesday, October 12, 2016 - 5:39:15 PM
Last modification on : Thursday, March 5, 2020 - 5:40:12 PM
Long-term archiving on: : Saturday, February 4, 2017 - 8:32:53 PM

File

367527_1_En_3_Chapter.pdf
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Sk Ali, Samah Saeed, Ozgur Sinanoglu, Ramesh Karri. New Scan-Based Attack Using Only the Test Mode and an Input Corruption Countermeasure. 21th IFIP/IEEE International Conference on Very Large Scale Integration - System on a Chip (VLSI-SoC), Oct 2013, Istanbul, Turkey. pp.48-68, ⟨10.1007/978-3-319-23799-2_3⟩. ⟨hal-01380298⟩

Share

Metrics

Record views

278

Files downloads

570