DocumentCode :
1757902
Title :
Test Versus Security: Past and Present
Author :
da Rolt, Jean ; Das, Aruneema ; Di Natale, G. ; Flottes, M.-L. ; Rouzeyre, B. ; Verbauwhede, Ingrid
Author_Institution :
UFRGS, Porto Alegre, Brazil
Volume :
2
Issue :
1
fYear :
2014
fDate :
41699
Firstpage :
50
Lastpage :
62
Abstract :
Cryptographic circuits need to be protected against side-channel attacks, which target their physical attributes while the cryptographic algorithm is in execution. There can be various side-channels, such as power, timing, electromagnetic radiation, fault response, and so on. One such important side-channel is the design-for-testability (DfT) infrastructure present for effective and timely testing of VLSI circuits. The attacker can extract secret information stored on the chip by scanning out test responses against some chosen plaintext inputs. The purpose of this paper is to first present a detailed survey on the state-of-the-art in scan-based side-channel attacks on symmetric and public-key cryptographic hardware implementations, both in the absence and presence of advanced DfT structures, such as test compression and X-masking, which may make the attack difficult. Then, the existing scan attack countermeasures are evaluated for determining their security against known scan attacks. In addition, JTAG vulnerability and security countermeasures are also analyzed as part of the external test interface. A comparative area-timing-security analysis of existing countermeasures at various abstraction levels is presented in order to help an embedded security designer make an informed choice for his intended application.
Keywords :
VLSI; design for testability; embedded systems; integrated circuit testing; public key cryptography; JTAG vulnerability; VLSI circuit testing; X-masking; advanced DfT structures; area-timing-security analysis; cryptographic algorithm; cryptographic circuits; design-for-testability infrastructure; embedded security; plaintext inputs; public-key cryptographic hardware implementations; scan attack countermeasures; scan-based side-channel attacks; secret information; symmetric hardware implementations; test compression; test responses; Computer crime; Computer hacking; Computer security; Cryptography; Decoding; Hardware security; comparative area-timing-security analysis; scan attack countermeasures; scan-based attacks; test interface misuse;
fLanguage :
English
Journal_Title :
Emerging Topics in Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
2168-6750
Type :
jour
DOI :
10.1109/TETC.2014.2304492
Filename :
6733305
Link To Document :
بازگشت