SlideShare a Scribd company logo
1 of 21
Kodela.Jagadeesh
Agenda
 Abstract
 Introduction
What is Security Testing
Purpose of Security Testing
Scan-Based Attacks
Types of Attacks
 Content of Attackers
Misuse of Test Interfaces
Conclusion
References
Abstract
Cryptographic circuits need to be protected against side-
channel attacks, which target their physical attributes while the
cryptographic algorithm is in execution. There can be various
side-channels, such as power, timing, electromagnetic
radiation, fault response, and so on. One such important side-
channel is the design-for-testability (DfT) infrastructure present
for effective and timely testing of VLSI circuits.The purpose of
this paper is to rst present a detailed survey on the state-of-
the-art in scan-based side-channel attacks on symmetric and
public-key cryptographic hardware implementations, both in
the absence and presence of advanced DfT structures, such
as test compression and X-masking, which may make the
attack diffcult.
Introduction
Structural testing is one important step in the production of
integrated circuits. Indeed, the fabrication of CMOS devices is
not a totally controlled process and some of the manufactured
Chips may not work properly. Testing is therefore essential to
Sort faulty and good circuits and thus ensure the quality of the
products. The increasing test cost of new technologies demands
the insertion of test-oriented structures early in the integrated
circuit (IC) design cycle, which is called Design-for-Testabilit
(DfT). These structures aims at improving the testability
(mainl the capacity to detect the presence of faults), diagnostics,
test time and reducing the number of required test pins.
What is Security Testing
Security testing is a process to determine that
an information system protects data and maintains
functionality.
To check whether there is any information leakage.
To test the application whether it has unauthorized
access and having the encoded security code.
To finding out all the potential loopholes and
weaknesses of the system.
Purpose of Security Testing
Primary purpose of security testing is to identify the
vulnerabilities and subsequently repairing them.
Security Testing helps in improving the current system
and also helps in ensuring that the system will work
for longer time.
Security test helps in finding out loopholes that can
cause loss of important information.
Scan-Based Attacks
The insertion of scan chains consists of replacing the flip-flops
(FFs) of the design by scan flip-flops (SFFs) and connecting
these SFFs into a shift-register, called scan chain.
The scan chain is bound to a input pin (scan-in) and to an
output pin (scan-out). An extra pin called scan-enable should
be added to control the scan chain's data shifting. If the scanenable
is set to 0, the SFFs are connected to the circuit to
behave as functionally expected (functional mode). When the
scan-enable is set to 1, the SFFs are connected to the scan
chain, and the bitstream at the scan-in is shifted in while the
data stored in the SFFs is shifted out through the scan-out pin.
Scan-Based Attacks
By controlling the scan-in and scan-enable inputs and observing the
scan-out pin, and attacker can observe confidential data or corrupt
internal states. Then the below Fig. 1 illustrates the duality between test
and security.
Types of Attacks:
Attack Basic Procedure
Attacking Cryptographic Primitives
Attacker Model
Known Scan-Based Attacks
Attack Basic Procedure
 As depicted in Fig. 1, the attacker can use the shift operation maliciously,
switching from functional to test mode at will.
 Even if the attacker uses the shift operation as the test engineer, the attack's
procedure is different from the standard test procedure.
 For instance, suppose that some of
 the flip-flops inserted on the scan chain contain confidential Information .
 An observability attack would consist of the following steps:
a. reset the circuit
b. load the chosen input at the cipher's input
c. run part of the encryption
d. switch to test
e. mode when the intermediate flip-flops contain data related to the secret and
shift out the scan contents containing this confidential information
f. analyze the observed contents and try to uncover the secret key.
Attacking Cryptographic Primitives
 The science of coding and decoding messages so as to
keep these messages secure. Coding takes place using
a key that ideally is known only by the sender and
intended recipient of the message.
 In computer programming, a primitive is a basic
interface or segment of code that can be used to build
more sophisticated program elements or interfaces.
 The below Fig. 2 shows an example of how the scan-
based attacks can compromise the security of
symmetric-key or public-key cryptography.
 Both symmetric-key and public-key algorithms usually have structures
that repeat the same operations for multiple iterations.
 The more iterations, the harder for attackers to nd out the secret by
only observing the plaintext/input and the ciphertext/output.
Attacker Model
 In this model we classify into 4 classes.
 They are:
Class 1: Amateur,
Class 2: Expert,
Class 3: Insider,
Class 4: Expert with advanced equipment
Attacker Model
 Class 1: Amateur
Knows the cipher algorithm implementation, as well as timing
diagrams for correctly operating the circuit (this information is usually
present in the circuit datasheet).
 Class 2: Expert
Can uncover design details with the help of DPA or timing analysis,
consisting mainly of input/output register buffers and additional
registers that may be affected by plaintext (DFF storage elements).
These DFFs may complicate the observation of data related to the
secret.
Attacker Model
 Class 3: Insider
Knows the correspondence between the circuit flip-flops and their
position within the scan chain.
 Class 4: Expert with advanced equipment
Can remove the chip package and probe internal signals. This is
important in cases where the scan chains are disconnected after
manufacturing test by means of anti-fuses. This class of attackers can
still probe unconnected scan chains.
 It must be noted that a Class 3 or 4 attacker have of course all the
abilities of the lower class attackers.
Known Scan-Based Attacks
 The rst scan attack proposed in the literature was conceived to
break a Data Encryption Standard (DES) block cipher.
 Yang et al. described a two-phase procedure that consists in first
finding the position of the intermediate registers in the scan
chain, and then retrieving the DES first round key.
 In order to find the position, 64 pairs of plaintexts are loaded.
Two plaintexts are loaded.
 Two plaintexts of any of these pairs have a single-bit difference
and each pair has a difference in a different location.
 Using the procedure described in subsection II-A, the attacker
shifts out internal states when the plaintexts are loaded into the
registers that store the intermediate values and then these
register's flip-flops are localized.
 Then the attacker applies three chosen plaintexts and shifts out
the scan data to recover the first round key.
Misuse of Test Interfaces
 Test interfaces such as JTAG and IEEE 1500 have two
security drawbacks:
 they make scan-based attacks easier and
 They can be used to upload corrupted firmware in non-
volatile
 memories or read out internal contents.
 The first issue comes from the fact that they provide access
to individual components(chips on board or cores on
SoCs).
 It implies that malicious users can apply scan-based attacks
on the cryptographic blocks only, which makes the analysis
phase of the attack easier.
Conclusion
In this paper we described two main issues related to the
test and security domain: scan-based attacks and misuse of
JTAG interfaces. Both threats exploit security issues present
in structures that implemented test and debug of digital
ICs. To help the understanding of scan-based attacks, we
have described the principles of these attacks. Then we
presented a survey of the known scan-based attacks so
that designers can take them into account when building
new circuits. Additionally, we described some well known
issues related to the misuse of JTAG and IEEE 1500 test
interfaces.
References
[1] (1994). Federal Information Processing Standards Publication 140-2:
Security Requirements for Cryptographic Modules [Online]. Available:
http://csrc.nist.gov/publications/ps/ps140-2/ps1402.pdf
[2] D. Hely, M.-L. Flottes, F. Bancel, B. Rouzeyre, N. Berard, and
M. Renovell, ``Scan design and secure chip [secure IC testing],'' in
Proc.
10th IEEE IOLTS, Jul. 2004, pp. 219224.
[3] J. Lee, M. Tehranipoor, C. Patel, and J. Plusquellic, ``Securing designs
against scan-based side-channel attacks,'' IEEE Trans. Dependable
Secure
Comput., vol. 4, no. 4, pp. 325336, Oct. 2007.
[4] J. Da Rolt, G. Di Natale, M. Flottes, and B. Rouzeyre, ``A novel
differential
scan attack on advanced DFT structures,'' ACM Trans. Des. Autom.
Electron. Syst., vol. 18, no. 4, p. 58, Oct. 2013.
Any
Test versus security @ IEEE Concept

More Related Content

What's hot

Reconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatformsReconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatformsAbdullah Deeb
 
Finding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection ExploitsFinding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection Exploitsamiable_indian
 
IDS - Fact, Challenges and Future
IDS - Fact, Challenges and FutureIDS - Fact, Challenges and Future
IDS - Fact, Challenges and Futureamiable_indian
 
A fast static analysis approach to detect exploit code inside network flows
A fast static analysis approach to detect exploit code inside network flowsA fast static analysis approach to detect exploit code inside network flows
A fast static analysis approach to detect exploit code inside network flowsUltraUploader
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools iSyaiful Ahdan
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemAvinash Kumar
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection finalAkshay Bansal
 
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks IJNSA Journal
 
Bypassing firewalls
Bypassing firewallsBypassing firewalls
Bypassing firewallsKumar
 
De-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali LinuxDe-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali LinuxIRJET Journal
 
Deliberately Un-Dependable Applications: the Role of Dependability Metrics in...
Deliberately Un-Dependable Applications: the Role of Dependability Metrics in...Deliberately Un-Dependable Applications: the Role of Dependability Metrics in...
Deliberately Un-Dependable Applications: the Role of Dependability Metrics in...a001
 
M phil-computer-science-cryptography-projects
M phil-computer-science-cryptography-projectsM phil-computer-science-cryptography-projects
M phil-computer-science-cryptography-projectsVijay Karan
 
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSSHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSijwmn
 
Intrusion Alert Correlation
Intrusion Alert CorrelationIntrusion Alert Correlation
Intrusion Alert Correlationamiable_indian
 
Procuring the Anomaly Packets and Accountability Detection in the Network
Procuring the Anomaly Packets and Accountability Detection in the NetworkProcuring the Anomaly Packets and Accountability Detection in the Network
Procuring the Anomaly Packets and Accountability Detection in the NetworkIOSR Journals
 
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...ijcsit
 
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET Journal
 

What's hot (19)

Reconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatformsReconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatforms
 
Finding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection ExploitsFinding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection Exploits
 
Testbed For Ids
Testbed For IdsTestbed For Ids
Testbed For Ids
 
IDS - Fact, Challenges and Future
IDS - Fact, Challenges and FutureIDS - Fact, Challenges and Future
IDS - Fact, Challenges and Future
 
Jurassic Pcap
Jurassic PcapJurassic Pcap
Jurassic Pcap
 
A fast static analysis approach to detect exploit code inside network flows
A fast static analysis approach to detect exploit code inside network flowsA fast static analysis approach to detect exploit code inside network flows
A fast static analysis approach to detect exploit code inside network flows
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection final
 
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
 
Bypassing firewalls
Bypassing firewallsBypassing firewalls
Bypassing firewalls
 
De-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali LinuxDe-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali Linux
 
Deliberately Un-Dependable Applications: the Role of Dependability Metrics in...
Deliberately Un-Dependable Applications: the Role of Dependability Metrics in...Deliberately Un-Dependable Applications: the Role of Dependability Metrics in...
Deliberately Un-Dependable Applications: the Role of Dependability Metrics in...
 
M phil-computer-science-cryptography-projects
M phil-computer-science-cryptography-projectsM phil-computer-science-cryptography-projects
M phil-computer-science-cryptography-projects
 
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSSHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
 
Intrusion Alert Correlation
Intrusion Alert CorrelationIntrusion Alert Correlation
Intrusion Alert Correlation
 
Procuring the Anomaly Packets and Accountability Detection in the Network
Procuring the Anomaly Packets and Accountability Detection in the NetworkProcuring the Anomaly Packets and Accountability Detection in the Network
Procuring the Anomaly Packets and Accountability Detection in the Network
 
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
 
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
 

Viewers also liked

Software libre y software privativo
Software libre y software privativo Software libre y software privativo
Software libre y software privativo Marcelo Tellechea
 
Blogs en el aprendizaje
Blogs en el aprendizajeBlogs en el aprendizaje
Blogs en el aprendizajetania castro
 
Social watch workshop summary of day 1
Social watch workshop  summary of day 1Social watch workshop  summary of day 1
Social watch workshop summary of day 1Sonnie Kibz
 
kgl-315 200мвт Зеленая лазерная указка http://www.lasersru.com/kgl-315-200mw-...
kgl-315 200мвт Зеленая лазерная указка http://www.lasersru.com/kgl-315-200mw-...kgl-315 200мвт Зеленая лазерная указка http://www.lasersru.com/kgl-315-200mw-...
kgl-315 200мвт Зеленая лазерная указка http://www.lasersru.com/kgl-315-200mw-...Lasersru Lasersru
 
Citar Fuentes electronicas
Citar Fuentes electronicasCitar Fuentes electronicas
Citar Fuentes electronicasAkemiRa-Lee
 
03.[슬라이드]브래그피크 v20160224(ch)
03.[슬라이드]브래그피크 v20160224(ch)03.[슬라이드]브래그피크 v20160224(ch)
03.[슬라이드]브래그피크 v20160224(ch)Samsung Medical Center
 
ContainerDays Boston 2015: "CoreOS: Building the Layers of the Scalable Clust...
ContainerDays Boston 2015: "CoreOS: Building the Layers of the Scalable Clust...ContainerDays Boston 2015: "CoreOS: Building the Layers of the Scalable Clust...
ContainerDays Boston 2015: "CoreOS: Building the Layers of the Scalable Clust...DynamicInfraDays
 
Instalación de Windows 7 usando virtualbox
Instalación de Windows 7 usando virtualboxInstalación de Windows 7 usando virtualbox
Instalación de Windows 7 usando virtualboxAdriiana Torrez
 
Presentation + Template Samples
Presentation + Template SamplesPresentation + Template Samples
Presentation + Template SamplesGerald Willis
 
Trastorno obsesivo compulsivo
Trastorno obsesivo compulsivoTrastorno obsesivo compulsivo
Trastorno obsesivo compulsivoSabrina Farias
 
Ryan Markel - WordCamp StL 2016 - Code Review
Ryan Markel - WordCamp StL 2016 - Code ReviewRyan Markel - WordCamp StL 2016 - Code Review
Ryan Markel - WordCamp StL 2016 - Code Reviewryanmarkel
 
IOS Swift Language 3rd tutorial
IOS Swift Language 3rd tutorialIOS Swift Language 3rd tutorial
IOS Swift Language 3rd tutorialHassan A-j
 

Viewers also liked (14)

Software libre y software privativo
Software libre y software privativo Software libre y software privativo
Software libre y software privativo
 
Blogs en el aprendizaje
Blogs en el aprendizajeBlogs en el aprendizaje
Blogs en el aprendizaje
 
Social watch workshop summary of day 1
Social watch workshop  summary of day 1Social watch workshop  summary of day 1
Social watch workshop summary of day 1
 
kgl-315 200мвт Зеленая лазерная указка http://www.lasersru.com/kgl-315-200mw-...
kgl-315 200мвт Зеленая лазерная указка http://www.lasersru.com/kgl-315-200mw-...kgl-315 200мвт Зеленая лазерная указка http://www.lasersru.com/kgl-315-200mw-...
kgl-315 200мвт Зеленая лазерная указка http://www.lasersru.com/kgl-315-200mw-...
 
Citar Fuentes electronicas
Citar Fuentes electronicasCitar Fuentes electronicas
Citar Fuentes electronicas
 
03.[슬라이드]브래그피크 v20160224(ch)
03.[슬라이드]브래그피크 v20160224(ch)03.[슬라이드]브래그피크 v20160224(ch)
03.[슬라이드]브래그피크 v20160224(ch)
 
ContainerDays Boston 2015: "CoreOS: Building the Layers of the Scalable Clust...
ContainerDays Boston 2015: "CoreOS: Building the Layers of the Scalable Clust...ContainerDays Boston 2015: "CoreOS: Building the Layers of the Scalable Clust...
ContainerDays Boston 2015: "CoreOS: Building the Layers of the Scalable Clust...
 
Instalación de Windows 7 usando virtualbox
Instalación de Windows 7 usando virtualboxInstalación de Windows 7 usando virtualbox
Instalación de Windows 7 usando virtualbox
 
Presentation + Template Samples
Presentation + Template SamplesPresentation + Template Samples
Presentation + Template Samples
 
Escritorio2do
Escritorio2doEscritorio2do
Escritorio2do
 
Trastorno obsesivo compulsivo
Trastorno obsesivo compulsivoTrastorno obsesivo compulsivo
Trastorno obsesivo compulsivo
 
Windows 7, 8 y 10
Windows 7, 8 y 10Windows 7, 8 y 10
Windows 7, 8 y 10
 
Ryan Markel - WordCamp StL 2016 - Code Review
Ryan Markel - WordCamp StL 2016 - Code ReviewRyan Markel - WordCamp StL 2016 - Code Review
Ryan Markel - WordCamp StL 2016 - Code Review
 
IOS Swift Language 3rd tutorial
IOS Swift Language 3rd tutorialIOS Swift Language 3rd tutorial
IOS Swift Language 3rd tutorial
 

Similar to Test versus security @ IEEE Concept

Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...eSAT Journals
 
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561Vishwanath rakesh ece 561
Vishwanath rakesh ece 561RAKESH_CSU
 
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWAREHARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWAREVLSICS Design
 
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWAREHARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWAREVLSICS Design
 
Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...
Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...
Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...idescitation
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)JIEMS Akkalkuwa
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentationUshnish Chowdhury
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Verification of Security for Untrusted Third Party IP Cores
Verification of  Security for Untrusted Third Party IP CoresVerification of  Security for Untrusted Third Party IP Cores
Verification of Security for Untrusted Third Party IP CoresIRJET Journal
 
Watchguard Firewall overview and implemetation
Watchguard  Firewall overview and implemetationWatchguard  Firewall overview and implemetation
Watchguard Firewall overview and implemetationKaveh Khosravi
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...EditorJST
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessDavid Sweigert
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environmentidescitation
 

Similar to Test versus security @ IEEE Concept (20)

Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...
 
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561Vishwanath rakesh ece 561
Vishwanath rakesh ece 561
 
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWAREHARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
 
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWAREHARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
 
Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...
Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...
Breaching of Ring Oscillator Based Trojan Detection and Prevention in Physica...
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
A05510105
A05510105A05510105
A05510105
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Firewall
FirewallFirewall
Firewall
 
Verification of Security for Untrusted Third Party IP Cores
Verification of  Security for Untrusted Third Party IP CoresVerification of  Security for Untrusted Third Party IP Cores
Verification of Security for Untrusted Third Party IP Cores
 
Watchguard Firewall overview and implemetation
Watchguard  Firewall overview and implemetationWatchguard  Firewall overview and implemetation
Watchguard Firewall overview and implemetation
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
 
publication1
publication1publication1
publication1
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 
CNS UNIT-VI.pptx
CNS UNIT-VI.pptxCNS UNIT-VI.pptx
CNS UNIT-VI.pptx
 

Recently uploaded

Hire 💕 8617697112 Meerut Call Girls Service Call Girls Agency
Hire 💕 8617697112 Meerut Call Girls Service Call Girls AgencyHire 💕 8617697112 Meerut Call Girls Service Call Girls Agency
Hire 💕 8617697112 Meerut Call Girls Service Call Girls AgencyNitya salvi
 
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Call Girls in Nagpur High Profile
 
Sector 105, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 105, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 105, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 105, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
call girls in Vasundhra (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Vasundhra (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...call girls in Vasundhra (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Vasundhra (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...Delhi Call girls
 
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...amitlee9823
 
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...kumaririma588
 
HiFi Call Girl Service Delhi Phone ☞ 9899900591 ☜ Escorts Service at along wi...
HiFi Call Girl Service Delhi Phone ☞ 9899900591 ☜ Escorts Service at along wi...HiFi Call Girl Service Delhi Phone ☞ 9899900591 ☜ Escorts Service at along wi...
HiFi Call Girl Service Delhi Phone ☞ 9899900591 ☜ Escorts Service at along wi...poojakaurpk09
 
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.Nitya salvi
 
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...Call Girls in Nagpur High Profile
 
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...SUHANI PANDEY
 
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...amitlee9823
 
Sweety Planet Packaging Design Process Book.pptx
Sweety Planet Packaging Design Process Book.pptxSweety Planet Packaging Design Process Book.pptx
Sweety Planet Packaging Design Process Book.pptxbingyichin04
 
UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...
UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...
UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...RitikaRoy32
 
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard ...
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard  ...Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard  ...
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard ...nirzagarg
 
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...sonalitrivedi431
 
Jordan_Amanda_DMBS202404_PB1_2024-04.pdf
Jordan_Amanda_DMBS202404_PB1_2024-04.pdfJordan_Amanda_DMBS202404_PB1_2024-04.pdf
Jordan_Amanda_DMBS202404_PB1_2024-04.pdfamanda2495
 

Recently uploaded (20)

Hire 💕 8617697112 Meerut Call Girls Service Call Girls Agency
Hire 💕 8617697112 Meerut Call Girls Service Call Girls AgencyHire 💕 8617697112 Meerut Call Girls Service Call Girls Agency
Hire 💕 8617697112 Meerut Call Girls Service Call Girls Agency
 
B. Smith. (Architectural Portfolio.).pdf
B. Smith. (Architectural Portfolio.).pdfB. Smith. (Architectural Portfolio.).pdf
B. Smith. (Architectural Portfolio.).pdf
 
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
 
Sector 105, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 105, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 105, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 105, Noida Call girls :8448380779 Model Escorts | 100% verified
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Vasundhra (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Vasundhra (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...call girls in Vasundhra (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Vasundhra (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
 
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman MuscatAbortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
 
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
 
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
 
HiFi Call Girl Service Delhi Phone ☞ 9899900591 ☜ Escorts Service at along wi...
HiFi Call Girl Service Delhi Phone ☞ 9899900591 ☜ Escorts Service at along wi...HiFi Call Girl Service Delhi Phone ☞ 9899900591 ☜ Escorts Service at along wi...
HiFi Call Girl Service Delhi Phone ☞ 9899900591 ☜ Escorts Service at along wi...
 
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.
 
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
 
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
 
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
 
Sweety Planet Packaging Design Process Book.pptx
Sweety Planet Packaging Design Process Book.pptxSweety Planet Packaging Design Process Book.pptx
Sweety Planet Packaging Design Process Book.pptx
 
UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...
UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...
UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...
 
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard ...
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard  ...Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard  ...
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard ...
 
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
💫✅jodhpur 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATISFACT...
 
Jordan_Amanda_DMBS202404_PB1_2024-04.pdf
Jordan_Amanda_DMBS202404_PB1_2024-04.pdfJordan_Amanda_DMBS202404_PB1_2024-04.pdf
Jordan_Amanda_DMBS202404_PB1_2024-04.pdf
 

Test versus security @ IEEE Concept

  • 2. Agenda  Abstract  Introduction What is Security Testing Purpose of Security Testing Scan-Based Attacks Types of Attacks  Content of Attackers Misuse of Test Interfaces Conclusion References
  • 3. Abstract Cryptographic circuits need to be protected against side- channel attacks, which target their physical attributes while the cryptographic algorithm is in execution. There can be various side-channels, such as power, timing, electromagnetic radiation, fault response, and so on. One such important side- channel is the design-for-testability (DfT) infrastructure present for effective and timely testing of VLSI circuits.The purpose of this paper is to rst present a detailed survey on the state-of- the-art in scan-based side-channel attacks on symmetric and public-key cryptographic hardware implementations, both in the absence and presence of advanced DfT structures, such as test compression and X-masking, which may make the attack diffcult.
  • 4. Introduction Structural testing is one important step in the production of integrated circuits. Indeed, the fabrication of CMOS devices is not a totally controlled process and some of the manufactured Chips may not work properly. Testing is therefore essential to Sort faulty and good circuits and thus ensure the quality of the products. The increasing test cost of new technologies demands the insertion of test-oriented structures early in the integrated circuit (IC) design cycle, which is called Design-for-Testabilit (DfT). These structures aims at improving the testability (mainl the capacity to detect the presence of faults), diagnostics, test time and reducing the number of required test pins.
  • 5. What is Security Testing Security testing is a process to determine that an information system protects data and maintains functionality. To check whether there is any information leakage. To test the application whether it has unauthorized access and having the encoded security code. To finding out all the potential loopholes and weaknesses of the system.
  • 6. Purpose of Security Testing Primary purpose of security testing is to identify the vulnerabilities and subsequently repairing them. Security Testing helps in improving the current system and also helps in ensuring that the system will work for longer time. Security test helps in finding out loopholes that can cause loss of important information.
  • 7. Scan-Based Attacks The insertion of scan chains consists of replacing the flip-flops (FFs) of the design by scan flip-flops (SFFs) and connecting these SFFs into a shift-register, called scan chain. The scan chain is bound to a input pin (scan-in) and to an output pin (scan-out). An extra pin called scan-enable should be added to control the scan chain's data shifting. If the scanenable is set to 0, the SFFs are connected to the circuit to behave as functionally expected (functional mode). When the scan-enable is set to 1, the SFFs are connected to the scan chain, and the bitstream at the scan-in is shifted in while the data stored in the SFFs is shifted out through the scan-out pin.
  • 8. Scan-Based Attacks By controlling the scan-in and scan-enable inputs and observing the scan-out pin, and attacker can observe confidential data or corrupt internal states. Then the below Fig. 1 illustrates the duality between test and security.
  • 9. Types of Attacks: Attack Basic Procedure Attacking Cryptographic Primitives Attacker Model Known Scan-Based Attacks
  • 10. Attack Basic Procedure  As depicted in Fig. 1, the attacker can use the shift operation maliciously, switching from functional to test mode at will.  Even if the attacker uses the shift operation as the test engineer, the attack's procedure is different from the standard test procedure.  For instance, suppose that some of  the flip-flops inserted on the scan chain contain confidential Information .  An observability attack would consist of the following steps: a. reset the circuit b. load the chosen input at the cipher's input c. run part of the encryption d. switch to test e. mode when the intermediate flip-flops contain data related to the secret and shift out the scan contents containing this confidential information f. analyze the observed contents and try to uncover the secret key.
  • 11. Attacking Cryptographic Primitives  The science of coding and decoding messages so as to keep these messages secure. Coding takes place using a key that ideally is known only by the sender and intended recipient of the message.  In computer programming, a primitive is a basic interface or segment of code that can be used to build more sophisticated program elements or interfaces.  The below Fig. 2 shows an example of how the scan- based attacks can compromise the security of symmetric-key or public-key cryptography.
  • 12.  Both symmetric-key and public-key algorithms usually have structures that repeat the same operations for multiple iterations.  The more iterations, the harder for attackers to nd out the secret by only observing the plaintext/input and the ciphertext/output.
  • 13. Attacker Model  In this model we classify into 4 classes.  They are: Class 1: Amateur, Class 2: Expert, Class 3: Insider, Class 4: Expert with advanced equipment
  • 14. Attacker Model  Class 1: Amateur Knows the cipher algorithm implementation, as well as timing diagrams for correctly operating the circuit (this information is usually present in the circuit datasheet).  Class 2: Expert Can uncover design details with the help of DPA or timing analysis, consisting mainly of input/output register buffers and additional registers that may be affected by plaintext (DFF storage elements). These DFFs may complicate the observation of data related to the secret.
  • 15. Attacker Model  Class 3: Insider Knows the correspondence between the circuit flip-flops and their position within the scan chain.  Class 4: Expert with advanced equipment Can remove the chip package and probe internal signals. This is important in cases where the scan chains are disconnected after manufacturing test by means of anti-fuses. This class of attackers can still probe unconnected scan chains.  It must be noted that a Class 3 or 4 attacker have of course all the abilities of the lower class attackers.
  • 16. Known Scan-Based Attacks  The rst scan attack proposed in the literature was conceived to break a Data Encryption Standard (DES) block cipher.  Yang et al. described a two-phase procedure that consists in first finding the position of the intermediate registers in the scan chain, and then retrieving the DES first round key.  In order to find the position, 64 pairs of plaintexts are loaded. Two plaintexts are loaded.  Two plaintexts of any of these pairs have a single-bit difference and each pair has a difference in a different location.  Using the procedure described in subsection II-A, the attacker shifts out internal states when the plaintexts are loaded into the registers that store the intermediate values and then these register's flip-flops are localized.  Then the attacker applies three chosen plaintexts and shifts out the scan data to recover the first round key.
  • 17. Misuse of Test Interfaces  Test interfaces such as JTAG and IEEE 1500 have two security drawbacks:  they make scan-based attacks easier and  They can be used to upload corrupted firmware in non- volatile  memories or read out internal contents.  The first issue comes from the fact that they provide access to individual components(chips on board or cores on SoCs).  It implies that malicious users can apply scan-based attacks on the cryptographic blocks only, which makes the analysis phase of the attack easier.
  • 18. Conclusion In this paper we described two main issues related to the test and security domain: scan-based attacks and misuse of JTAG interfaces. Both threats exploit security issues present in structures that implemented test and debug of digital ICs. To help the understanding of scan-based attacks, we have described the principles of these attacks. Then we presented a survey of the known scan-based attacks so that designers can take them into account when building new circuits. Additionally, we described some well known issues related to the misuse of JTAG and IEEE 1500 test interfaces.
  • 19. References [1] (1994). Federal Information Processing Standards Publication 140-2: Security Requirements for Cryptographic Modules [Online]. Available: http://csrc.nist.gov/publications/ps/ps140-2/ps1402.pdf [2] D. Hely, M.-L. Flottes, F. Bancel, B. Rouzeyre, N. Berard, and M. Renovell, ``Scan design and secure chip [secure IC testing],'' in Proc. 10th IEEE IOLTS, Jul. 2004, pp. 219224. [3] J. Lee, M. Tehranipoor, C. Patel, and J. Plusquellic, ``Securing designs against scan-based side-channel attacks,'' IEEE Trans. Dependable Secure Comput., vol. 4, no. 4, pp. 325336, Oct. 2007. [4] J. Da Rolt, G. Di Natale, M. Flottes, and B. Rouzeyre, ``A novel differential scan attack on advanced DFT structures,'' ACM Trans. Des. Autom. Electron. Syst., vol. 18, no. 4, p. 58, Oct. 2013.
  • 20. Any