@inproceedings{ab1089e9f55f41229347fcf59fb64530,
title = "AES design space exploration new line for scan attack resiliency",
abstract = "Crypto-chips are vulnerable to side-channel attacks. Scan attack is one such side-channel attack which uses the scan-based DFT test infrastructure to leak the secret information of the crypto-chip. In the presence of scan, an attacker can run the chip in normal mode, and then by switching to the test mode, retrieve the intermediate results of the crypto-chip. Using only a few input-output pairs one can retrieve the entire secret key. Almost all the scan attacks on AES crypto-chip use the same iterative 128-bit AES design where the round register is placed exactly after the round operation. However, the attack potency may vary depending on the design of AES. In this work, we consider various designs of AES. We shed light on the impact of design style on the scan attack. We also consider response compaction in our analysis. We show that certain design decisions deliver inherent resistance to scan attack.",
keywords = "AES Scan Chain, Scan Attack, Scan-based DFT, Security, Testability",
author = "Ali, {Sk Subidh} and Ozgur Sinanoglu and Ramesh Karri",
note = "Publisher Copyright: {\textcopyright} 2014 IEEE.; 2014 22nd International Conference on Very Large Scale Integration, VLSI-SoC 2014 ; Conference date: 06-10-2014 Through 08-10-2014",
year = "2015",
month = jan,
day = "7",
doi = "10.1109/VLSI-SoC.2014.7004193",
language = "English (US)",
series = "IEEE/IFIP International Conference on VLSI and System-on-Chip, VLSI-SoC",
publisher = "IEEE Computer Society",
number = "January",
editor = "Lorena Garcia",
booktitle = "2014 22nd International Conference on Very Large Scale Integration, VLSI-SoC 2014 - Conference Proceedings",
edition = "January",
}