Scan Design and Secure Chip
نویسندگان
چکیده
Testing a secure system is often considered as a severe bottleneck. While testability requires to an increase in both observability and controllability, secure chips are designed with the reverse in mind, limiting access to chip content and on-chip controllability functions. As a result, using usual design for testability techniques when designing secure ICs may seriously decrease the level of security provided by the chip. This dilemma is even more severe as secure applications need well-tested hardware to ensure that the programmed operations are correctly executed. In this paper, a security analysis of the scan technique is performed. This analysis aims at pointing out the security vulnerability induced by using such a DfT technique. A solution securing the scan is finally proposed.
منابع مشابه
Preventing scan-based attacks on secure-ICs with on-chip comparison
Hardware implementation of secure applications, e.g. cryptographic algorithms, is subject to various attacks. In fact, it has been previously demonstrated that scan chains introduced by Design for Testability open a backdoor to potential attacks. Here we propose a scan-protection scheme that provides testing facilities both at production time and over the course of the circuit’s life. The under...
متن کاملOn-Chip Comparison for Testing Secure ICs
Hardware implementations of secure applications, e.g. cryptographic algorithms, are subject to various attacks. In particular, it has been demonstrated that scan chains introduced by Design for Testability open a backdoor to potential attacks. In this paper we propose a scan protection scheme that provides testing facilities both at production time and during the circuit’s lifetime. The underly...
متن کاملChallenge-response based secure test wrapper for testing cryptographic circuits
C ryptographic circuits need special test infrastructure due to the concern of security involved. Normal design for testability methods, such as scan chains, as applied to most ASICs cannot be applied directly to Cryptographic chips. These methods, though providing the highest testability, open backdoors or side-channels for attackers, to extract secret keys or Intellectual Property information...
متن کاملStrongly Secure Scan Design Using Generalized Feed Forward Shift Registers
In our previous work [12], [13], we introduced generalized feed-forward shift registers (GF2SR, for short) to apply them to secure and testable scan design, where we considered the security problem from the viewpoint of the complexity of identifying the structure of GF2SRs. Although the proposed scan design is secure in the sense that the structure of a GF2SR cannot be identified only from the ...
متن کاملSecuring Scan Design Using Lock & Key Technique
Scan test has been a common and useful method for testing VLSI designs due to the high controllability and observability it provides. These same properties have recently been shown to also be a security threat to the intellectual property on a chip [1]. In order to defend from scan based attacks, we present the Lock & Key technique. Our proposed technique provides security while not negatively ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004