@inproceedings{23edcc9b7d6b45b89d830b1a9b78c169,
title = "New scan attacks against state-of-the-art countermeasures and DFT",
abstract = "Scan attack has been known as a threat to Design for Testability (DFT). All the existing attacks require both the normal mode and the test mode of the device. In normal mode the intermediate results of a crypto-hardware are captured in scan chains and in the test mode the results are shifted out. One simple countermeasure for this kind of attacks is to reset the device whenever there is a switch of the mode. A recent test-mode-only attack shows that the mode-reset countermeasure is insecure against scan attack. An attack is still possible using only the test mode of the device. However, the attack was presented without the presence of an on-chip test compactor. In this paper we propose a new test-mode-only attack on AES hardware which works in the presence of an on-chip response compactor. The proposed attack retrieves the secret key with negligible time complexity. The attack results show that DFT infrastructures with response compactor are vulnerable to scan attack even in the presence of mode-reset countermeasure.",
keywords = "AES, Scan Attack, Scan Chain, Scan-based DFT, Security, Testability",
author = "Ali, {Sk Subidh} and Ozgur Sinanoglu and Saeed, {Samah Mohamed} and Ramesh Karri",
year = "2014",
doi = "10.1109/HST.2014.6855585",
language = "English (US)",
isbn = "9781479941148",
series = "Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014",
publisher = "IEEE Computer Society",
pages = "142--147",
booktitle = "Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014",
note = "2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014 ; Conference date: 06-05-2014 Through 07-05-2014",
}