Relying on a recently developed gate-level information assurance scheme, we formally analyze the security of design-for-test (DFT) scan chains, the industrial standard testing methods for fabricated chips and, for the first time, formally prove that a circuit with scan chain inserted can violate security properties. The same security assessment method is then applied to a built-in-self-test (BIST) structure where it is shown that even BIST structures can cause security vulnerabilities. To balance trustworthiness and testability, a new design-for-security (DFS) methodology is proposed which, through the modification of scan chain structure, can achieve high security without compromising the testability of the inserted scan structure. To supp...
Abstract—Hardware implementation of cryptographic algorithms is subject to various attacks. It has b...
ISBN: 0769524060On-line testing approaches can today be useful when designing circuits with severe s...
Scan attacks exploit facilities offered by scan chains to retrieve embedded secret data, in particul...
Relying on a recently developed gate-level information assurance scheme, we formally analyze the sec...
National audienceCrypto-processors are the target of attacks. For instance, an attacker may exploit ...
International audienceTesting a secure system is often considered as a severe bottleneck. While test...
Abstract — Hardware implementation of cryptographic algorithms is subject to various attacks. It has...
International audienceAs security remains a major concern in more and more application, security of ...
International audienceThe design of secure ICs requires fulfilling means conforming to many design r...
International audienceStructural testing is one important step in the production of integrated circu...
International audienceCryptographic algorithms are used to protect sensitive information from untrus...
Design-for-Test (DFT) techniques have been developed to improve testability of integrated circuits. ...
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to ...
VI. CONCLUSION In this paper, a flipped scan-chain architecture is proposed to test cryptographic de...
Scan test is widely used in integrated circuit test. However, the excellent observability and contro...
Abstract—Hardware implementation of cryptographic algorithms is subject to various attacks. It has b...
ISBN: 0769524060On-line testing approaches can today be useful when designing circuits with severe s...
Scan attacks exploit facilities offered by scan chains to retrieve embedded secret data, in particul...
Relying on a recently developed gate-level information assurance scheme, we formally analyze the sec...
National audienceCrypto-processors are the target of attacks. For instance, an attacker may exploit ...
International audienceTesting a secure system is often considered as a severe bottleneck. While test...
Abstract — Hardware implementation of cryptographic algorithms is subject to various attacks. It has...
International audienceAs security remains a major concern in more and more application, security of ...
International audienceThe design of secure ICs requires fulfilling means conforming to many design r...
International audienceStructural testing is one important step in the production of integrated circu...
International audienceCryptographic algorithms are used to protect sensitive information from untrus...
Design-for-Test (DFT) techniques have been developed to improve testability of integrated circuits. ...
Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to ...
VI. CONCLUSION In this paper, a flipped scan-chain architecture is proposed to test cryptographic de...
Scan test is widely used in integrated circuit test. However, the excellent observability and contro...
Abstract—Hardware implementation of cryptographic algorithms is subject to various attacks. It has b...
ISBN: 0769524060On-line testing approaches can today be useful when designing circuits with severe s...
Scan attacks exploit facilities offered by scan chains to retrieve embedded secret data, in particul...