Scan attack in presence of mode-reset countermeasure

Sk Subidh Ali, Samah Mohamed Saeed, Ozgur Sinanoglu, Ramesh Karri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Design for testability (DFT) is the most common testing technique used in the modern VLSI industries. However, when this technique is incorporated in a cryptographic circuit, it may open a back door to an attacker. The attacker can get access to the internal scan chains by switching the device from the normal mode to the test mode and then observe the chip content. The scan cells which were originally used to enhance the testability, can thus be misused to access the intermediate results of the cryptographic algorithm running inside the chip. One countermeasure against such attacks is to reset the device whenever there is a switch from the normal mode to the test mode. In this work we are going to analyse this countermeasure and show that it is not completely secure against scan attack. We show that an attack is possible using only the test mode which will bypass the countermeasure.

Original languageEnglish (US)
Title of host publicationProceedings of the 2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013
Pages230-231
Number of pages2
DOIs
StatePublished - 2013
Event2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013 - Chania, Crete, Greece
Duration: Jul 8 2013Jul 10 2013

Publication series

NameProceedings of the 2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013

Other

Other2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013
Country/TerritoryGreece
CityChania, Crete
Period7/8/137/10/13

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Scan attack in presence of mode-reset countermeasure'. Together they form a unique fingerprint.

Cite this