Globalization of the semiconductor industry has raised concerns about the trustworthiness of integrated circuits. This particularly becomes a major concern for cryptographic IP blocks integrated on a System-on-Chip (SoC). The trustworthiness of these cryptographic blocks can be ensured with an appropriate test strategy. Presently, the IEEE 1500 Test Wrapper has emerged as the test standard for industrial SoCs. Additionally a secure activation mechanism has been proposed to this standard in order to restrict access to the testing interface to eligible testers by using a cryptographic authentication mechanism. This access mechanism is necessary in order to avoid any side-channels which may leak secret information to adversaries. However, this...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
International audienceAs security remains a major concern in more and more application, security of ...
Globalization of semiconductor supply/design chain has led to several hardware security problems. Th...
Globalization of the semiconductor industry increases the vulnerability of integrated circuits. This...
Testing of Integrated Circuit (IC) is important phase in production cycle. Today’s System-on-chip (S...
Secure communication has been paramount throughout history. Although in the early ages it was mainly...
Scan-based side-channel attacks have become a new threat to cryptographic chips. Existing countermea...
This article presents a secure mutual testing strategy for System-on-Chips (SoCs) that implement cry...
The integrated circuit (IC) development process is becoming increasingly vulnerable to malicious act...
Abstract—Security is becoming an increasingly important parameter in current system-on-chip (SoC) de...
Abstract — Hardware implementation of cryptographic algorithms is subject to various attacks. It has...
© 2018 IEEE. During the secure boot process for a trusted execution environment, the processor must ...
As the technology node scales down to 45nm and beyond, the significant increase in design complexity...
International audienceIP protection is a recent field of research. If passive protection schemes, ma...
As increasingly important modules in modern embedded systems, cryptographic circuits rely on provabl...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
International audienceAs security remains a major concern in more and more application, security of ...
Globalization of semiconductor supply/design chain has led to several hardware security problems. Th...
Globalization of the semiconductor industry increases the vulnerability of integrated circuits. This...
Testing of Integrated Circuit (IC) is important phase in production cycle. Today’s System-on-chip (S...
Secure communication has been paramount throughout history. Although in the early ages it was mainly...
Scan-based side-channel attacks have become a new threat to cryptographic chips. Existing countermea...
This article presents a secure mutual testing strategy for System-on-Chips (SoCs) that implement cry...
The integrated circuit (IC) development process is becoming increasingly vulnerable to malicious act...
Abstract—Security is becoming an increasingly important parameter in current system-on-chip (SoC) de...
Abstract — Hardware implementation of cryptographic algorithms is subject to various attacks. It has...
© 2018 IEEE. During the secure boot process for a trusted execution environment, the processor must ...
As the technology node scales down to 45nm and beyond, the significant increase in design complexity...
International audienceIP protection is a recent field of research. If passive protection schemes, ma...
As increasingly important modules in modern embedded systems, cryptographic circuits rely on provabl...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
International audienceAs security remains a major concern in more and more application, security of ...
Globalization of semiconductor supply/design chain has led to several hardware security problems. Th...