The Community for Technology Leaders
2013 18th IEEE European Test Symposium (ETS) (2011)
Trondheim, Norway
May 23, 2011 to May 27, 2011
ISSN: 1530-1877
ISBN: 978-0-7695-4433-5
pp: 19-24
ABSTRACT
The conflict between security and testability is still a concern of hardware designers. While secure devices must protect confidential information from unauthorized users, quality testing of these devices requires the controllability and observability of a substantial quantity of embedded information, and thus may jeopardize the data confidentiality. Several attacks using the test infrastructures (and in particular scan chains) have been described. More recently it has been shown how test response compaction structures provide a natural counter-measure against this type of attack. However, in this paper, we show that even in the presence of response compactors the scan-based attack is still possible and it requires low complexity computation. We then give some perspectives concerning the techniques that can be used to increase the scan-based attack complexity without affecting the testability of the device.1
INDEX TERMS
security, testability, scan-based attack, response compaction
CITATION
Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, Jean DaRolt, "Scan Attacks and Countermeasures in Presence of Scan Response Compactors", 2013 18th IEEE European Test Symposium (ETS), vol. 00, no. , pp. 19-24, 2011, doi:10.1109/ETS.2011.30
113 ms
(Ver 3.3 (11022016))