Refine Search

New Search

Results: 4

(searched for: doi:10.1109/inis.2016.048)
Save to Scifeed
Page of 1
Articles per Page
by
Show export options
  Select all
Withdrawal
S.M.H. Sithi Shameem Fathima, J. Sakubar Sadiq, A. Valanarasi, G. Arunmani, G.S. Ashadharani
Published: 11 March 2021
Materials Today: Proceedings; https://doi.org/10.1016/j.matpr.2021.01.608

The publisher has not yet granted permission to display this abstract.
Sudeendra Kumar K, Saurabh Seth, , Abhishek Mahapatra, Ayas Kanta Swain, KamalaKanta Mahapatra
Abstract:
The increased testability and observability due to test structures make chips vulnerable to side channel attacks. The intention of side channel attack are leaking secret keys used in cryptographic cores and getting access to trade related sensitive information stored in chips. Several countermeasures against test based side-channel attacks are available in research literature. One such countermeasure scheme is password based access protection to IEEE 1500 test wrapper, such that only an authentic user with valid password is allowed to access the test structures. IEEE 1500 is a core test standard for enabling the streamlined test integration and test reuse. The trust model of existing schemes assume outsourced assembly and test (OSAT) centre are completely trusted and design house will share secret keys to unlock the IEEE 1500 wrapper during testing. In this paper, we propose a Physical Unclonable Function (PUF) based technique incorporating challenge-response to support comprehensive test security in which there is no need for design house to share secret keys with untrusted OSAT centre to unlock the scan chains. The proposed scheme comes at the cost of reasonable area and performance overhead.
Page of 1
Articles per Page
by
Show export options
  Select all
Back to Top Top