Securing designs against scan-based side-channel attacks

被引:114
作者
Lee, Jeremy
Tehranipoor, Mohammad
Patel, Chintan
Plusquellic, Jim
机构
[1] Univ Connecticut, Dept Elect & Comp Engn, Storrs, CT 06269 USA
[2] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21250 USA
关键词
lock & key; scan design; security; hacking; side-channel attacks;
D O I
10.1109/TDSC.2007.70215
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Traditionally, the only standard method of testing that has consistently provided high fault coverage has been scan test due to the high controllability and high observability this technique provides. The scan chains used in scan test not only allow test engineers to control and observe a chip, but these properties also allow the scan architecture to be used as a means to breach chip security. In this paper, we propose a technique, called Lock & Key, to neutralize the potential for scan-based side-channel attacks. It is very difficult to implement an all inclusive security strategy, but by knowing the attacker, a suitable strategy can be devised. The Lock & Key technique provides a flexible security strategy to modern designs without significant changes to scan test practices. Using this technique, the scan chains are divided into smaller subchains. With the inclusion of a test security controller, access to subchains are randomized when being accessed by an unauthorized user. Random access reduces repeatability and predictability making reverse engineering more difficult. Without proper authorization, an attacker would need to unveil several layers of security before gaining proper access to the scan chain in order to exploit it. The proposed Lock & Key technique is design independent while maintaining a relatively low area overhead.
引用
收藏
页码:325 / 336
页数:12
相关论文
共 34 条
  • [1] Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
  • [2] [Anonymous], 2001, IEEE Std 1149.1-2001, P1, DOI [10.1109/ieeestd.2001.92950, DOI 10.1109/IEEESTD.2001.92950]
  • [3] [Anonymous], BEST LAID BOARDS
  • [4] [Anonymous], SCAN DESIGN CALLED P
  • [5] BIHAM E, 1997, LNCS, V1294, P513, DOI DOI 10.1007/BFB0052259
  • [6] Boneh Dan, 1997, LECT NOTES COMPUTER, V1233, P37, DOI DOI 10.1007/3-540-69053-0_
  • [7] Bushnell M., 2000, ESSENTIALS ELECT TES
  • [8] Dervisoglu B. I., 1991, Proceedings. International Test Conference 1991 (IEEE Cat. No.91CH3032-0), P365, DOI 10.1109/TEST.1991.519696
  • [9] DESIGN AND TEST OF AN INTEGRATED CRYPTOCHIP
    HAFNER, K
    RITTER, HC
    SCHWAIR, TM
    WALLSTAB, S
    DEPPERMANN, M
    GESSNER, J
    KOESTERS, S
    MOELLER, WD
    SANDWEG, G
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 1991, 8 (04): : 6 - 17
  • [10] Test control for secure scan designs
    Hély, D
    Bancel, F
    Flottes, ML
    Rouzeyre, B
    [J]. ETS 2005:10TH IEEE EUROPEAN TEST SYMPOSIUM, PROCEEDINGS, 2005, : 190 - 195