A Dynamic-Key Secure Scan Structure Against Scan-Based Side Channel and Memory Cold Boot Attacks

被引:4
|
作者
Wu, Chia-Chi [1 ]
Kuo, Man-Hsuan [1 ]
Lee, Kuen-Jong [1 ]
机构
[1] Natl Cheng Kung Univ, Dept EE, Tainan, Taiwan
来源
2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS) | 2018年
关键词
hardware security; side-channel attack; memory attack; dynamic key generation; secure scan architecture;
D O I
10.1109/ATS.2018.00020
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Scan design is a universal design for test (DFT) technology to increase the observability and controllability of the circuits under test by using scan chains. However, it also leads to a potential security problem that attackers can use scan design as a backdoor to extract confidential information. Researchers have tried to address this problem by using secure scan structures that usually have some keys to confirm the identities of users. However, the traditional methods to store intermediate data or keys in memory are also under high risk of being attacked. In this paper, we propose a dynamic-key secure DFT structure that can defend scan-based and memory attacks without decreasing the system performance and the testability. The main idea is to build a scan design key generator that can generate the keys dynamically instead of storing and using keys in the circuit statically. Only specific patterns derived from the original test patterns are valid to construct the keys and hence the attackers cannot shift in any other patterns to extract correct internal response from the scan chains or retrieve the keys from memory. Analysis results show that the proposed method can achieve a very high security level and the security level will not decrease no matter how many guess rounds the attackers have tried due to the dynamic nature of our method.
引用
收藏
页码:48 / 53
页数:6
相关论文
共 50 条
  • [41] Scan-Based Structure with Reduced Static and Dynamic Power Consumption
    Sharifi, Shervin
    Jaffari, Javid
    Hosseinabady, Mohammad
    Afzali-Kusha, Ali
    Navabi, Zainalabedin
    JOURNAL OF LOW POWER ELECTRONICS, 2006, 2 (03) : 477 - 487
  • [42] A Robust Scan-based Side-channel Attack Method against HMAC-SHA-256 Circuits
    Oku, Daisuke
    Yanagisawa, Masao
    Togawa, Nozomu
    2017 IEEE 7TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - BERLIN (ICCE-BERLIN), 2017, : 79 - 84
  • [43] Scan-based Self Anomaly Detection: Client-side Mitigation of Channel-based Man-in-the-Middle Attacks against Wi-Fi
    Gong, Sheng
    Ochiai, Hideya
    Esaki, Hiroshi
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1498 - 1503
  • [44] Secure Dynamic Memory Scheduling against Timing Channel Attacks
    Wang, Yao
    Wu, Benjamin
    Suh, G. Edward
    2017 23RD IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA), 2017, : 301 - 312
  • [45] Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications
    Wang, WeiZheng
    Deng, Zhuo
    Wang, Jin
    Sangaiah, Arun Kumar
    Cai, Shuo
    Almakhadmeh, Zafer
    Tolba, Amr
    SENSORS, 2019, 19 (20)
  • [46] Invisible Scan for Protecting against Scan-based Attacks: You Can't Attack What You Can't See
    Gaikwad, Pravin
    Slpsk, Patanjali
    Bhunia, Swarup
    2023 IEEE INTERNATIONAL TEST CONFERENCE INDIA, ITC INDIA, 2023,
  • [47] Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures
    Agrawal, Mukesh
    Karmakar, Sandip
    Saha, Dhiman
    Mukhopadhyay, Debdeep
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 226 - 238
  • [48] MEAS: memory encryption and authentication secure against side-channel attacks
    Unterluggauer, Thomas
    Werner, Mario
    Mangard, Stefan
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (02) : 137 - 158
  • [49] MEAS: memory encryption and authentication secure against side-channel attacks
    Thomas Unterluggauer
    Mario Werner
    Stefan Mangard
    Journal of Cryptographic Engineering, 2019, 9 : 137 - 158
  • [50] Scan attacks on side-channel and fault attack resistant public-key implementations
    Da Rolt, Jean
    Das, Amitabh
    Ghosh, Santosh
    Di Natale, Giorgio
    Flottes, Marie-Lise
    Rouzeyre, Bruno
    Verbauwhede, Ingrid
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (04) : 207 - 219