Preventing scan-based attacks on secure-ICs with on-chip comparison

نویسندگان

  • Jean Da Rolt
  • Giorgio Di Natale
  • Marie-Lise Flottes
  • Bruno Rouzeyre
چکیده

Hardware implementation of secure applications, e.g. cryptographic algorithms, is subject to various attacks. In fact, it has been previously demonstrated that scan chains introduced by Design for Testability open a backdoor to potential attacks. Here we propose a scan-protection scheme that provides testing facilities both at production time and over the course of the circuit’s life. The underlying principle being to scan-in both input vectors and expected responses and compare expected and actual responses within the circuit. Compared to regular scan tests, this technique has no impact on the quality of the test or the modelbased fault diagnosis. It entails negligible area overhead and avoids the use of an authentication test mechanism.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On-Chip Comparison for Testing Secure ICs

Hardware implementations of secure applications, e.g. cryptographic algorithms, are subject to various attacks. In particular, it has been demonstrated that scan chains introduced by Design for Testability open a backdoor to potential attacks. In this paper we propose a scan protection scheme that provides testing facilities both at production time and during the circuit’s lifetime. The underly...

متن کامل

Providing secure execution environments with a last line of defense against Trojan circuit attacks

Integrated circuits (ICs) are often produced in foundries that lack effective security controls. In these foundries, sophisticated attackers are able to insert malicious Trojan circuits that are easily hidden in the large, complex circuitry that comprises modern ICs. These so-called Trojan circuits are capable of launching attacks directly in hardware, or, more deviously, can facilitate softwar...

متن کامل

Scan Design and Secure Chip

Testing a secure system is often considered as a severe bottleneck. While testability requires to an increase in both observability and controllability, secure chips are designed with the reverse in mind, limiting access to chip content and on-chip controllability functions. As a result, using usual design for testability techniques when designing secure ICs may seriously decrease the level of ...

متن کامل

PUF – Physical Unclonable Functions

from historical banking and telecommunication applications to electronic passports, electronic IDs, anti-counterfeiting devices, smartgrid applications, and more. The security requirements for most of these applications are crucial and evolving. In addition, more and more sophisticated attacks are being developed every day. As a result, design of Smart Card ICs is a growing challenge. This pape...

متن کامل

Comparison of SRAM and FF PUF in 65nm Technology

Hardware security is an essential tool in the prevention of cloning, theft of service and tampering. This security is often based on cryptographic primitives, which use a key that is securely stored somewhere in the hardware. The strength of the security is therefore dependent upon the effort required from an attacker to compromise this key. Since the tools used to carry out attacks on hardware...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012