PUF based on chip comparison technique for trustworthy scan design data security against side channel attack

被引:0
作者
Mukkath S.I. [1 ]
Devi N.M. [1 ]
机构
[1] Department of Electronics and Communication Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore
关键词
automatic reconfiguration; data security; design for testing; DFT; hardware as a service; on chip comparison; physical unclonable function; PUF; security;
D O I
10.1504/IJCC.2023.130899
中图分类号
学科分类号
摘要
All fields of computational technology, including cloud computing and cryptography, are vulnerable to different types of external threads. Scan-based testing method is a well-known tool for testing integrated chips, but at the same time, it helps hacking the secret code from the chip. The scan hardware can act as a platform for attackers to hack the secret data from the chip. Most of the existing solutions are based on the alteration of the conventional scan structure with more complex design which focused only on security but violates the testability. In this paper, we propose a dynamic reconfiguration architecture using embedded PUF design, which protects the chip from brute force attack, hamming distance-based attack with optimal deployment configuration. Additional on-chip comparison and masking were also used to enhance security. The experimental results are evaluated on standard benchmark circuits. Copyright © 2023 Inderscience Enterprises Ltd.
引用
收藏
页码:201 / 223
页数:22
相关论文
共 26 条
  • [1] Barzilai Z., Coppersmith D., Rosenberg A.L., Exhaustive bit generation with application to VLSI self-testing, IEEE Transactions on Computers, C-32, 2, pp. 190-194, (1983)
  • [2] Bushnell M.L., Agrawal V.D., Essentials of Electronic Testing for Digital, Memory, And Mixed-Signal VLSI Circuits, (2000)
  • [3] Chandran U., Zhao D., SS-KTC: a high-testability low-overhead scan architecture with multi-level security integration, Proc. of IEEE VLSI Test Symposium, pp. 321-326, (2007)
  • [4] Changlong L., Yiqiang Z., Yafeng S., Xingbo G., A system-on-chip bus architecture for hardware trojan protection in security chips, IEEE International Conference of Electron Devices and Solid-State Circuits, pp. 1-2, (2011)
  • [5] Chiu G-M., Li J.C-M., A secure test wrapper design against internal and boundary scan attacks for embedded cores, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 20, 1, pp. 126-134, (2012)
  • [6] Da Rolt J., Di Natale G., Flottes M., Rouzeyre B., On-chip test comparison for protecting confidential data in secure ICs, 2012 17th IEEE European Test Symposium (ETS), pp. 1-1, (2012)
  • [7] Da Rolt J., Di Natale G., Flottes M., Rouzeyre B., A smart test controller for scan chains in secure circuits, 2013 IEEE 19th International On-Line Testing Symposium (IOLTS), pp. 228-229, (2013)
  • [8] Da Rolt J., Di Natale G., Flottes M-L., Rouzeyre B., Preventing scan-based attacks on secure-ICs with on-chip comparison, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 22, 4, pp. 947-951, (2013)
  • [9] Da Rolt J., Di Natale G., Flottes M., Rouzeyre B., Thwarting scan-based attacks on secure-ICs with on-chip comparison, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 22, 4, pp. 947-951, (2014)
  • [10] Da Rolt J., Di Natale G., Flottes M-L., Rouzeyre B., Scan attacks and countermeasures in presence of scan response compactors, Sixteenth IEEE European Test Symposium, pp. 19-24, (2011)