TY - GEN
T1 - A Dynamic-Key Secure Scan Structure Against Scan-Based Side Channel and Memory Cold Boot Attacks
AU - Wu, Chia Chi
AU - Kuo, Man Hsuan
AU - Lee, Kuen Jong
N1 - Funding Information:
ACKNOWLEDGEMENT This work was partially supported by the Ministry of Science and Technology of Taiwan under Contracts 105-2221-E-006-242and 107-2218-E-006-025.
Publisher Copyright:
© 2018 IEEE.
PY - 2018/12/6
Y1 - 2018/12/6
N2 - Scan design is a universal design for test (DFT) technology to increase the observability and controllability of the circuits under test by using scan chains. However, it also leads to a potential security problem that attackers can use scan design as a backdoor to extract confidential information. Researchers have tried to address this problem by using secure scan structures that usually have some keys to confirm the identities of users. However, the traditional methods to store intermediate data or keys in memory are also under high risk of being attacked. In this paper, we propose a dynamic-key secure DFT structure that can defend scan-based and memory attacks without decreasing the system performance and the testability. The main idea is to build a scan design key generator that can generate the keys dynamically instead of storing and using keys in the circuit statically. Only specific patterns derived from the original test patterns are valid to construct the keys and hence the attackers cannot shift in any other patterns to extract correct internal response from the scan chains or retrieve the keys from memory. Analysis results show that the proposed method can achieve a very high security level and the security level will not decrease no matter how many guess rounds the attackers have tried due to the dynamic nature of our method.
AB - Scan design is a universal design for test (DFT) technology to increase the observability and controllability of the circuits under test by using scan chains. However, it also leads to a potential security problem that attackers can use scan design as a backdoor to extract confidential information. Researchers have tried to address this problem by using secure scan structures that usually have some keys to confirm the identities of users. However, the traditional methods to store intermediate data or keys in memory are also under high risk of being attacked. In this paper, we propose a dynamic-key secure DFT structure that can defend scan-based and memory attacks without decreasing the system performance and the testability. The main idea is to build a scan design key generator that can generate the keys dynamically instead of storing and using keys in the circuit statically. Only specific patterns derived from the original test patterns are valid to construct the keys and hence the attackers cannot shift in any other patterns to extract correct internal response from the scan chains or retrieve the keys from memory. Analysis results show that the proposed method can achieve a very high security level and the security level will not decrease no matter how many guess rounds the attackers have tried due to the dynamic nature of our method.
UR - http://www.scopus.com/inward/record.url?scp=85060028126&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85060028126&partnerID=8YFLogxK
U2 - 10.1109/ATS.2018.00020
DO - 10.1109/ATS.2018.00020
M3 - Conference contribution
AN - SCOPUS:85060028126
T3 - Proceedings of the Asian Test Symposium
SP - 48
EP - 53
BT - Proceedings - 2018 IEEE 27th Asian Test Symposium, ATS 2018
PB - IEEE Computer Society
T2 - 27th IEEE Asian Test Symposium, ATS 2018
Y2 - 15 October 2018 through 18 October 2018
ER -